Fig. 23From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesFor specific victim, find additional threats beyond the given scenarioBack to article page