[1]
C. Natasya, I. Irvin, and A. A. S. Gunawan, “A Systematic Literature Review: Cyber Attack: Phishing Environments, Techniques, and Detection Mechanism”, IJCSHAI, vol. 1, no. 1, pp. 7–11, Oct. 2024.