- DocumentArticle 2uploaded by
Tourjana Supti
- DocumentUtilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacksuploaded by
Tourjana Supti
- DocumentThe_Role_of_Extraversion_in_Phishing_Victimisation_A_Systematic_Literature_Reviewuploaded by
Tourjana Supti