Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Technical Exchange Meeting: “MITRE Generative AI in Biotechnology Roundtable”

Publication
January 17, 2025
… Technical Exchange Meeting: “MITRE Generative AI in Biotechnology Roundtable” Experts from government, academia, and industry were convened to explore the transformative impact of AI on biotechnology, emphasizing the need for strategic … change. To inquire about uses of artificial intelligence in biotechnology, please contact bio@mitre.org. NOVEMBER 2024 ©2024 The MITRE Corporation. ALL RIGHTS RESERVED. Approved …

Intelligence After Next: Meeting the China Challenge—Key Focus Areas for the Intelligence Community

Publication
December 29, 2023
… the IC for Intensifying Strategic Competition The Intelligence Community is not positioned to tackle full-spectrum competition with the People's Republic of China. It must broaden … espionage in the United Kingdom is on an “epic” scale, with Chinese spies attempting to make contact with more than 20,000 people.9 Given their large global footprint, Chinese intelligence … for the China Threat, Foreign Affairs, September 2020. Available: https://www.foreignaffairs.com/articles/united-states/2020-09-30/us-intelligence-community-not- prepared-china-threat 4. …

Patterns of Success in Systems Engineering: Acquisition of IT-Intensive Government Systems

Publication
November 01, 2011
… Government Systems George Rebovich Jr. Dr. Joseph DeRosa The objective of this effort was to discover patterns of success in the systems engineering of information technology … fading channels containing specular components, IEEE Trans. Commun. Technology, vol. COM-14, Aug.. 1966, pp. 400–406. Patterns of Success in Systems Engineering 45 of funding sources … systems engineering and acquisition team. They must be capable of acting as a single point of contact (i.e., Architect.org) from start to finish—their knowledge of the technology and mission …

The South Pacific Influence Challenge: Sage Dragon Game Report

Publication
September 07, 2023
… the United States and Australia on the other. Like Japan in the 1940s, China may be attempting to establish a forward defense perimeter by drawing a new “island chain” that complicates U.S. … by Mark Seip. Edited by Adam Hebert and Mary Bruzzese. For questions about this report, please contact strategic.competitor@mitre.org. Endnotes 1 Kirsty Needham, “China Seeks Pacific Islands … Cooperation - Document,” Reuters, May 25, 2022, sec. Asia Pacific, https://www.reuters.com/world/asia-pacific/exclusive-china-seeks-pacific-islands-policing-security- …

Enterprise Mission Tailored OAuth 2.1 and OpenID Connect Profiles 

Publication
December 30, 2022
… However, the base specifications alone are insufficient for enterprise adoption due to numerous optional requirements, undefined behaviors, and issues that have been identified … metadata endpoint for an authorization server: { 11 "token_endpoint": "https://as.example.com/token", "token_endpoint_auth_methods_supported": [ "tls_client_auth"1 ], "jwks_uri": … sensitive operations. Examples of other potential authenticators include the Fast Identity Online (FIDO) standards (either using an external token such as a YubiKey or using a …

Ransomware: Getting Started Guide and Deep Dive into REvil

Publication
September 26, 2022
… Connie Zhang This paper goes into detail about the REvil ransomware variant and its operators to provide an in-depth look at how it begins its infection chain and why. This paper goes into … targeted in a massive hack by REvil operators, who stole 1 TB of data and posted parts of it online. (Davis, Another COVID-19 Research Firm Targeted by Ransomware Attack, 2020) ƒ In 2020, … hit by REvil ransomware attack. Retrieved 07 21, 2021, from https://www.bleepingcomputer.com/news/security/healthcare-giant-grupo-fleury-hit-by- revil-ransomware-attack/ 2. Checkpoint. …

The State of Security Automation Standards - 2011

Publication
November 01, 2011
… The State of Security Automation Standards - 2011 Gerard McGuire Emily Reid This paper seeks to provide an overview of all the components in security automation. Security automation standards sponsored by the U.S. Government have … standards team. 3-22 2.2.7.2 CYBEX Sponsor Developer URL ITU-T ITU-T http://ccr.sigcomm.org/online/files/p59- 3v40n5i-takahashi3A.pdf http://www.itu.int/itu- …

State of the Research in Human Language Technology: A Study of ACL and NAACL Publications from 2007 through 2014

Publication
March 10, 2015
… State of the Research in Human Language Technology: A Study of ACL and NAACL Publications from 2007 through 2014 Karine Megerdoomian he goal of this study is to identify state-of-the-art in human language technology (HLT) for the application areas of … information features robust 28 neural approach based on predicting 29 dependency parsing online extraction from discriminative 30 alignment generation social evaluation 31 Appendix 3: …

MITRE Challenge–Strengthening Eligibility Verification for Federal Benefit Programs

Publication
November 25, 2019
… for Federal Benefit Programs Vanessa Abiaad James Bradshaw Erin Carlson Gordon Milbourn III In Fiscal Year 2018, agencies not verifying benefit recipients’ eligibility led to $38 billion of improper payments. Aligning with the PMA, this Challenge sought fresh ideas for … learning-based analysis of their profile. These citizens would have options to select a contact method (text, app notification, telephone, website, mail) and preferred frequency of …

Information Sharing Risk Assessment: The RAISE Methodology

Publication
December 01, 2007
… Bodeau Donald Faatz Richard Graubart The RAISE methodology provides a risk-based approach to navigating the information sharing problem domain. The RAISE Methodology includes: a framework … are distributed among, a variety of stakeholders – Stakeholders include  Participants in information sharing: information providers, recipients, and those who provide venues in which … recommendation functions automated in proof-of- concept tool – For further information, contact  Deb Bodeau (dbodeau@mitre.org, 781-271-8436)  Don Faatz (dfaatz@mitre.org, …
  • First page
  • Previous page
  • …
  • Page 129
  • Page 130
  • Page 131
  • Page 132
  • Current page 133
  • Page 134
  • Page 135
  • Page 136
  • Page 137
  • …
  • Next page
  • Last page
Displaying 1321 - 1330 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links