Fig. 16From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesThe domain ontology of social engineering in cybersecurity developed in ProtégéBack to article page