[1]
I. Lazarovych and A. Kvasniuk, “Comparative analysis of transformer models and hybrid architectures in phishing content detection tasks”, ITEE, no. 2, pp. 14–19, Jun. 2025.