From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
No. | Relation | Description | Relation |
---|---|---|---|
1 | motivate | Inverse Of | motivated by |
2 | incent | SubProperty Of | motivate |
3 | drive | SubProperty Of | motivate |
4 | incented by | SubProperty Of | motivated by |
5 | driven by | SubProperty Of | motivated by |
6 | incent | Inverse Of | incented by |
7 | drive | Inverse Of | driven by |
8 | apply to | Inverse Of | suffer |
optional verbose relations | |||
9 | conduct | Equivalent To | craft and perform |
10 | exploited by | Inverse Of | to exploit |