Login / Signup

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs.

Edona FasllijaHasan Ferit EniserBernd Prünster
Published in: SecureComm (2) (2019)
Keyphrases
  • public key infrastructure
  • email
  • access control
  • malicious activities
  • automatic detection
  • countermeasures
  • public key
  • data sets
  • log data
  • identity theft
  • search engine
  • key technologies