Fig. 22From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesFind the most used (top 3) attack mediums and social interactionBack to article page