Skip to search formSkip to main contentSkip to account menu

Cyber Intelligence Sharing and Protection Act

Known as: The Cybersecurity Act of 2012, Cispa, CISAPA 
The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Application markets streamline the end-users’ task of finding and installing applications. They also form an immediate… 
2019
2019
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while efficient zero-knowledge proofs of… 
2017
2017
We present techniques for attributing amplification DDoS attacks to the booter services that launched the attack. Our k-Nearest… 
2016
2016
Amplification DDoS attacks have gained popularity and become a serious threat to Internet participants. However, little is known… 
2016
2016
In recent years, the drive-by malware space has undergone significant consolidation. Today, the most common source of drive-by… 
Highly Cited
2013
Highly Cited
2013
The success of Android phones makes them a prominent target for malicious software, in particular since the Android permission… 
2012
2012
The Cybersecurity Act of 2012, which was recently introduced in the Senate Homeland Security and Governance Affairs Committee, is… 
Review
2012
Review
2012
Android has become the most popular operating system for mobile devices, which makes it a prominent target for malicious software… 
2011
2011
Electricity forever changed the dark nights. Without the human ingenuity that harnessed energy in the form of electricity, our…