Fig. 24From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesFor specific attacker, find potential targets (victims) beyond the given scenarioBack to article page