Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,262,897 papers from all fields of science
Search
Sign In
Create Free Account
Cyber Intelligence Sharing and Protection Act
Known as:
The Cybersecurity Act of 2012
, Cispa
, CISAPA
Expand
The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Armando Stettner
Combating Online Infringement and Counterfeits Act
Cyber-security regulation
Cybersecurity Information Sharing Act
Expand
Broader (2)
Computer security
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
Duc Cuong Nguyen
,
Erik Derr
,
M. Backes
,
Sven Bugiel
IEEE Symposium on Security and Privacy
2019
Corpus ID: 131922034
Application markets streamline the end-users’ task of finding and installing applications. They also form an immediate…
Expand
2019
2019
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
M. Backes
,
L. Hanzlik
,
A. Herzberg
,
Aniket Kate
,
I. Pryvalov
IACR Cryptology ePrint Archive
2019
Corpus ID: 60442842
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while efficient zero-knowledge proofs of…
Expand
2017
2017
Linking Amplification DDoS Attacks to Booter Services
Johannes Krupp
,
Mohammad Karami
,
C. Rossow
,
Damon McCoy
,
M. Backes
International Symposium on Recent Advances in…
2017
Corpus ID: 40461
We present techniques for attributing amplification DDoS attacks to the booter services that launched the attack. Our k-Nearest…
Expand
2016
2016
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks
Johannes Krupp
,
M. Backes
,
C. Rossow
Conference on Computer and Communications…
2016
Corpus ID: 4508206
Amplification DDoS attacks have gained popularity and become a serious threat to Internet participants. However, little is known…
Expand
2016
2016
Kizzle: A Signature Compiler for Detecting Exploit Kits
Ben Stock
,
B. Livshits
,
B. Zorn
Dependable Systems and Networks
2016
Corpus ID: 15888006
In recent years, the drive-by malware space has undergone significant consolidation. Today, the most common source of drive-by…
Expand
Highly Cited
2013
Highly Cited
2013
AppGuard - Enforcing User Requirements on Android Apps
M. Backes
,
S. Gerling
,
Christian Hammer
,
Matteo Maffei
,
Philipp von Styp-Rekowsky
International Conference on Tools and Algorithms…
2013
Corpus ID: 12194031
The success of Android phones makes them a prominent target for malicious software, in particular since the Android permission…
Expand
2013
2013
Strong copyright protection versus development: comparative legal and economic analysis of copyright infringement in the US, the EU and Ukraine
K. Dudareva
2013
Corpus ID: 154654689
2012
2012
In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012
Scott J. Shackelford
2012
Corpus ID: 153288361
The Cybersecurity Act of 2012, which was recently introduced in the Senate Homeland Security and Governance Affairs Committee, is…
Expand
Review
2012
Review
2012
AppGuard — Real-time policy en- forcement for third-party applications
M. Backes
,
S. Gerling
,
Christian Hammer
,
Matteo Maffei
,
Philipp von Styp-Rekowsky
2012
Corpus ID: 7471672
Android has become the most popular operating system for mobile devices, which makes it a prominent target for malicious software…
Expand
2011
2011
Cybersecurity Policy for the Electricity Sector: The First Step to Protecting Our Critical Infrastructure From Cyber Threats
Zhen Zhang
2011
Corpus ID: 112010142
Electricity forever changed the dark nights. Without the human ingenuity that harnessed energy in the form of electricity, our…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE