Fig. 27
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

Analyze the same origin attack by knowledge graph
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Analyze the same origin attack by knowledge graph