Login / Signup
Investigating Phishing Attacks using the Registration Data Access Protocol (RDAP).
Hauke Jan Lübbers
Published in:
APWG.EU Tech (2023)
Keyphrases
</>
data access
phishing attacks
data management
data availability
data sharing
security risks
database applications
phishing emails
data objects
query logs
internet users
sql server
web search engines
relational databases
database systems
databases
database design
object oriented