- DocumentArticle 2uploaded byTourjana Supti
- DocumentUtilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacksuploaded byTourjana Supti
- DocumentThe_Role_of_Extraversion_in_Phishing_Victimisation_A_Systematic_Literature_Reviewuploaded byTourjana Supti