Don't Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies.
Fabian MarquardtChristopher SchmidtPublished in: LCN (2020)
Keyphrases
- website
- web applications
- web pages
- domain specific
- semantic web
- log analysis
- security issues
- information security
- information sources
- intrusion detection
- web documents
- web users
- domain independent
- web logs
- web mining
- specific domains
- public key infrastructure
- web content
- web technologies
- security policies
- log files
- linked data
- domain experts
- access control
- authentication mechanism
- factor authentication