European Proceedings Logo

Methodology For Studying The Influence Of Social Engineering

Figure 2: Gmail phishing attack

Gmail phishing attack
< Back to article