Fig. 5From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesCore entities (concepts) in social engineering domainBack to article page