Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,468 papers from all fields of science
Search
Sign In
Create Free Account
Cyber Intelligence Sharing and Protection Act
Known as:
The Cybersecurity Act of 2012
, Cispa
, CISAPA
Expand
The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Armando Stettner
Combating Online Infringement and Counterfeits Act
Cyber-security regulation
Cybersecurity Information Sharing Act
Expand
Broader (2)
Computer security
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Seamless In-App Ad Blocking on Stock Android
M. Backes
,
Sven Bugiel
,
Philipp von Styp-Rekowsky
,
Marvin WiBfeld
IEEE Security and Privacy Workshops (SPW)
2017
Corpus ID: 8669167
Advertisements in mobile applications have been shown to be a true danger to the users' privacy and security. Unfortunately, all…
Expand
2016
2016
Micro-policies for Web Session Security
Stefano Calzavara
,
R. Focardi
,
Niklas Grimm
,
Matteo Maffei
IEEE Computer Security Foundations Symposium
2016
Corpus ID: 746894
Micro-policies, originally proposed to implement hardware-level security monitors, constitute a flexible and general enforcement…
Expand
2016
2016
Herausforderungen des Internet of Things
Michael Backes
Datenschutz und Datensicherheit - DuD
2016
Corpus ID: 255352585
2015
2015
More than Words: Technical Activist Actions in #CISPA
Stacy Blasiola
,
Yoonmo Sang
,
W. Xu
2015
Corpus ID: 185268754
2014
2014
La responsabilità dell’Internet Service Provider per violazione del diritto d’autore: un’analisi comparata
Rossella Imperadori
2014
Corpus ID: 126475281
La rivoluzione tecnologica che, soprattutto a partire dal nuovo millennio, ha determinato il passaggio dall'era analogica all'era…
Expand
2014
2014
Privacy-Friendly Collaboration for Cyber Threat Mitigation
Julien Freudiger
,
Emiliano De Cristofaro
,
Alex Brito
arXiv.org
2014
Corpus ID: 6254157
Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat…
Expand
2013
2013
Strong copyright protection versus development: comparative legal and economic analysis of copyright infringement in the US, the EU and Ukraine
K. Dudareva
2013
Corpus ID: 154654689
2012
2012
Copyright Lawmaking and the Public Choice: From Legislative Battles to Private Ordering
Yafit Lev-Aretz
2012
Corpus ID: 45753666
2012
2012
Does CISPA Have Sufficient Safeguards
M. Rogers
,
Rebecca MacKinnon
2012
Corpus ID: 157497788
2002
2002
A COMPARISON OF ACADEMIC SUCCESS IN WEB-BASED VERSUS CAMPUS- BASED COURSES IN THE COMPUTER INFORMATION SYSTEMS - PROGRAMMER/ANALYST ASSOCIATE DEGREE PROGRAM AT WISCONSIN INDIANHEAD TECHNICAL COLLEGE…
Susan M. Yohnk Lockwood
2002
Corpus ID: 61326741
_________________Yohnk Lockwood Susan M_________ (Writer) (Last Name) (First) (Initial) A Comparison of Academic Success in Web…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE