Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

Improper Influence in Federally Funded Fundamental Research

Publication
December 22, 2020
… Improper Influence in Federally Funded Fundamental Research Lisa Ide Karen Lee Brittni Fine Christopher Moeller … Daniela Silitra Ph.D. Jodi Simco Ph.D. Alex Sisti Adam Terragnoli Findings and recommendations to increase resiliency to improper foreign government influence, improve the ability to identify, … and Reports 20 Stakeholder Concerns About Potential Negative Consequences of COAs 21 Barriers to Effective COA Implementation 23 FINDINGS AND OBSERVATIONS 26 General Findings and Observations …

Water-Based Textile Batteries

Publication
September 24, 2019
… Aqueous battery chemistries and materials for water-compatible, smart textiles are discussed in detail. Recent examples of flexible or textile-based prototypes are given. Aqueous battery … batteries has focused on lithium-ion battery chemistries, but these are extremely sensitive to air and water. There are several water-based battery chemistries, both non-rechargeable and … E P ORT Dept. No.: T821 Project No.: 10MSRF19-MA The views, opinions and/or findings contained in this report are those of Th MITRE Corporation and should not be construed as an official …

A Progress Report on the CVE Initiative

Publication
June 01, 2002
… advantage over its competitors. A vendor CNA must clearly advertise their security point of contact. They must provide the candidate to other affected parties, e.g., other vendors, … outreach by actively promoting CVE and educating the public about it, or introducing various contacts to the CVE Initiative. Occasionally, some Board members may participate in activities …

PARTS: Effectiveness of Advanced Driver Assistance Systems on Injury

Publication
November 20, 2025
… Crash Type Definition AEB Front-to-rear Striking Manner of Crash = Front-to-rear AND Initial Contact Point5 = [1, 12, 11] AND Motor Vehicle Maneuver Action NOT (backing or parked) AND Crash … Count = 1 AND First Event or First Harmful Event = Pedestrian or Non-motorist AND Initial Contact Point = [1, 12, 11] AND Motor Vehicle Maneuver Action NOT (backing or parked) Lateral …

MITRE-Harris Poll Survey: 75% of Health-Insured Individuals in the U.S. Concerned About Medical Bills

News Release
December 09, 2021
… that the primary responsibility is with the government.” Methodology This survey was conducted online within the United States, June 24–28, 2021, among 2,013 adults (ages 18 and over) by The … help leaders make the best decisions possible. To learn more, please visit  www.theharrispoll.com. About MITRE MITRE’s mission-driven teams are dedicated to solving problems for a safer … industry to tackle challenges to the safety, stability, and well-being of our nation.  Media Contact Mike Murphy,  media@mitre.org MITRE-Harris Poll Survey: 75% of Health-Insured Individuals …

MITRE ATT&CK

Publication
May 14, 2025
… a strategic advantage. Deep Dive Challenge MITRE's Solution Results Industry Impact Resources Contact MITRE Challenge  Anyone with a computer has the potential to cause damage from behind … for recognizing, responding to, and mitigating intrusions.  ATT&CK is free, easily accessible online, and regularly updated. It’s used in more than 190 countries on all seven continents. … for how to recognize, respond to, and mitigate intrusions. ATT&CK is free, easily accessible online, and regularly updated. It’s used in more than 190 countries on all seven continents. …

Time Anomaly Detection Appliqué (TADA)

Copyrighted
… Time Anomaly Detection Appliqué (TADA) is a mission-enabling innovation developed at MITRE to provide a reliable, real-time notification of a timing discrepancy. TADA can protect military, … differ. By making timing desynchronization detectable, TADA enables missions to succeed in an environment where GNSS provided time is compromised or untrustworthy. TADA enables the … Time Anomaly Detection Appliqué (TADA) is a mission-enabling innovation developed at MITRE to provide a reliable, real-time notification of a timing discrepancy. TADA can protect military, …

Fluid Application Monitor

FastLicense
… accessed, buttons clicked, or dialogs opened. The Fluid Application Monitor software is able to capture such data for native Windows applications (such as Microsoft Excel), Java applications (such as Agile Client), and web-based applications that run in a browser (such as OWF widgets). Applications do not require any custom tailoring or … accessed, buttons clicked, or dialogs opened. The Fluid Application Monitor software is able to capture such data for native Windows applications (such as Microsoft Excel), Java applications …

Evaluation of Machine Translation Errors in English and Iraqi Arabic

Publication
May 01, 2010
… Elmwd tTlE wt$try AlmwAd Ref: can+1p 1p+give+2ms det+money in-order-to 2ms+go-up and+2ms+buy det+material MT: >qdr Alflws wyn tTlE wt$try AlmwAd MT: can+1s det+money where 2ms+go-up and+2ms+buy det+material Source: we can give you funds to where you can go out and buy the materials Translation to English Arabic Word Order 0.171 0.166 Pro-Verb 0.003 0.000 …

Federal Big Data Summit Report - June 2016

Publication
August 19, 2016
… IoT device security requirements, and the usage of a person’s behavior data. The government’s buying power is staggering, but still is overwhelmed by aggregated consumer demand. The … Prescriptive analytics is characterized by techniques such as graph analysis, simulation, com- plex event processing, neural networks, recommendation engines, heuristics, and machine … the same for privacy âĂŞ this is implementing privacy engineering. • Get Senior Leadership buy-in for privacy. • Improve data auditing tools. 2.5 Using Big Data and Analytics in Health …
  • First page
  • Previous page
  • …
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Current page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • …
  • Next page
  • Last page
Displaying 311 - 320 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links