Fig. 20From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesAnalyze single social engineering attack scenario (e.g. scenario 9) by knowledge graphBack to article page