Fig. 2From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesEdit concepts and their descriptionBack to article page