Fig. 4From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesDefine and apply rules to knowledge reasoningBack to article page