[1]
“Phishing Detection Techniques: A review ”, Data Science: J. of Computing and Appl. Informatics, vol. 9, no. 1, pp. 32–46, Feb. 2025, doi: 10.32734/jocai.v9.i1-19904.