Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

CyGraph

Copyrighted
… critical assets, improving network security posture, and maintaining situational understanding in the face of cyberattacks. CyGraph captures complex relationships among entities in the … and mission impacts. Pattern-matching queries traverse the graph of interrelations according to user-specified constraints, yielding focused clusters of high-risk activity from the swarm of … risk focused on mission protection. To discuss licensing or collaboration activities, please contact us . … CyGraph is a prototype tool for protection of mission critical assets, improving …

A Study of Collaborative Work Practices in a Joint Military Setting

Publication
August 04, 2004
… and often geographically dispersed group of experts. Effective collaboration is essential to ensure high quality and timely decision making for developing an executable plan that supports … (organizational and personal). We suggest that a directory of names, affiliation, roles, and contact information be provided to aid in accessing identity information for fellow participants … a shared cursor to the proper location. Time savings avoiding verbal explanations; greater com- munications accuracy Shared white- board The ability to draw quick diagrams on the fly using …

Engineering Complex Systems

Publication
January 04, 2004
… and observations strongly suggest Enterprise Engineering is best approached using CSE to engineer and manage the enterprise. Engineering Complex Systems Engineering Complex Systems … traditional Systems Engineering. These serve as conditions for applying TSE: tp://www.google.com. Note the irony of using a complex system to help describe complex Engineering Complex … For example, such “integration” could first be required to happen “offline,” and then “online,” and finally “inline.” Each of these phases would be detailed and enforced by safety …

Mapping the Cyber Terrain: Enabling Cyber Defensibility Claims and Hypotheses to Be Stated and Evaluated with Greater Rigor and Utility

Publication
February 04, 2014
… Mapping the Cyber Terrain: Enabling Cyber Defensibility Claims and Hypotheses to Be Stated and Evaluated with Greater Rigor and Utility Deborah Bodeau Richard Graubart William … M. Devost, "Cyber Adversary Characterization," 2003. [Online]. Available: http://www.blackhat.com/presentations/bh-usa-03/bh-us-03- parker.pdf. [10] B. J. Wood and R. A. Duggan, "Red Teaming … Grier, D. Y. Wang, M. Motoyama, K. Levchenko, S. Savage and G. M. Voelker, "No Plan Survives Contact: Experience with Cybercrime Measurement," in 4th Workshop on Cyber Security …

After Solarwinds, Tamper Proofing the Cyber Ecosystem

Impact Story
February 14, 2022
… and private industry. A federal investigation revealed that SVR, the successor organization to the Soviet KGB, perpetrated the attack, giving Russians access to thousands of federal … through sophistication and patience,” December 16, 2020. [Online]. https:// blog.reversinglabs.com/blog/sunburst-the-next-level-of- stealth. [Accessed December 18, 2020]. 13. Recent reports … by Adam Smith’s “invisible hand” concept, wherein if each consumer can choose freely what to buy and each producer is allowed to choose freely what to sell and how to produce it, the market …

Fluid Application Monitor

FastLicense
… accessed, buttons clicked, or dialogs opened. The Fluid Application Monitor software is able to capture such data for native Windows applications (such as Microsoft Excel), Java applications (such as Agile Client), and web-based applications that run in a browser (such as OWF widgets). Applications do not require any custom tailoring or … stopped by the end user at any time. To discuss licensing or collaboration activities, please contact us . What is FastLicense™? FastLicense streamlines the technology transfer process by …

Intelligence After Next: Surveillance Technologies Are Imbedded into the Fabric of Modern Life—The Intelligence Community Must Respond

Publication
January 09, 2023
… commercial surveillance technology that continuously collects personal information, ostensibly to better tune advertising. The intelligence potential of this advertising technology or “AdTech” … to European researchers, just the real-time bidding platforms that deliver ads expose the online activity and location of an average person in the U.S. 747 times per day, 57% more often … Rorschach test for Catholics.” The Washington Post, 21 July 2021. https://www.washingtonpost.com/religion/2021/07/21/catholic-offcial-grindr-reaction/ 2. Hsu, Jeremy. “The Strava Heat Map …

Socio-Cultural Perspectives: A New Intelligence Paradigm

Publication
February 01, 2008
… "Socio-Cultural Perspectives: A New Intelligence Paradigm." The goal of the conference was to explore various ways in which socio-cultural perspectives could be used in intelligence … the express written permission of The MITRE Corporation. For further information, please contact The MITRE Corporation, Contracts Office, 7515 Colshire Drive, McLean, VA 22102-7508, … Language Do’s and Don'ts How does it shape battlefield? Operational implications? Mindset Com plexity WHAT? WHY? SO WHAT ? UNCLASSIFIED 39 Military Cultural Factors Customs UNCLASSIFIED …

Cloud SLA Considerations for the Government Consumer

Publication
September 29, 2015
… for Public Release. Page 1 of 65 Cloud SLA Considerations for the Government Consumer Update to 2010 MITRE Paper, Cloud Service Level Agreement Considerations for Government Consumers … Agreements, v2.0”. 4 “Federal CIOs want SLA assurances from Cloud vendors”, April 2015, CIO.com. ©2015 The MITRE Corporation. Approved for Public Release. Page 6 of 65 3333 … Elements and Sub-Elements Element Sub-Element SLA Context/Overview Provider and Consumer Contact Information Purpose Background Scope Stakeholders *Business Policies Planned Maintenance …

KML Best Practices for Interoperability

Publication
September 01, 2011
… Jason Mathews Keyhole Markup Language (KML), the data format used by Google Earth to annotate and view geospatial data on maps, has become an international Open Geospatial … process. See the following bugs for examples: Date reported Date fixed  http://code.google.com/p/earth-issues/issues/detail?id=359 Jun 2009 Jul 2010  … of KML File/Service Updates  Originating organization or Office of Primary Responsibility  Contact Phone Number/Website/Email Address  Source of Information  Method of data collection …
  • First page
  • Previous page
  • …
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Current page 33
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • …
  • Next page
  • Last page
Displaying 321 - 330 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links