Fig. 24
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

For specific attacker, find potential targets (victims) beyond the given scenario
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
For specific attacker, find potential targets (victims) beyond the given scenario