Fig. 19
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

The knowledge graph generated in Neo4j
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
The knowledge graph generated in Neo4j