Fig. 25From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesFor specific attacker and victim, find potential attack paths and methodsBack to article page