Fig. 26From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesExperiment results and statistic analysis of “Find additional (potential) threats for victims (targets)”, “Find potential targets for attackers” and “Find paths from specific attacker to specific target” sectionsBack to article page