Fig. 15From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesRules defined in the ontologyBack to article page