Fig. 18From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesThe overview of the knowledge base generated in ProtégéBack to article page