Fig. 14From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesOverview of concepts and relations defined in ProtégéBack to article page