Fig. 21From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesFind the most exploited (top 3) human vulnerabilitiesBack to article page