Login / Signup
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs.
Edona Fasllija
Hasan Ferit Eniser
Bernd Prünster
Published in:
SecureComm (2) (2019)
Keyphrases
</>
public key infrastructure
email
access control
malicious activities
automatic detection
countermeasures
public key
data sets
log data
identity theft
search engine
key technologies