Skip to main content
. 2020 Oct 23;76(1):139–154. doi: 10.1007/s11235-020-00733-2

Fig. 1.

Fig. 1

Phishing attack diagram [26]