Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Low Cost Surface Awareness

Copyrighted
… Transportation Copyrighted MITRE's Low Cost Surface Awareness system is a low cost capability to provide enhanced situational awareness of airport surface operations. This system provides a … and mid-sized airports, which may not be able to afford more sophisticated commercial systems. In addition to supplementing the out-the-window view at towered airports, the block … where it is not currently available. To discuss licensing or collaboration activities, please contact us . … MITRE's Low Cost Surface Awareness system is a low cost capability to provide …

Lessons Recorded from Applying the NATO Code of Best Practice (COBP) for C2 Assessment to Operations Other Than War (OOTW)

Publication
April 01, 2001
… Lessons Recorded from Applying the NATO Code of Best Practice (COBP) for C2 Assessment to Operations Other Than War (OOTW) Dr. Stuart Starr Don Kroening Over a seven year period, culminating in 1999, several NATO panels developed a NATO Code of Best Practice (COBP) for C2 Assessment. … stakeholders, and peer reviewers. The Problem Formulation process concludes when you have “buy in” from the key participants. In reality, it is desirable to refine the Problem Formulation …

Author DNA

Copyrighted
… along several attributes, including gender, age, and location. We perform text classification to identify the latent demographic attributes of authors, viewing each author as a set of … the user's social media postings. These features include the sets of words and characters used in a tweet's text, as well as the user's self-description, screen name, time zone, posting times, … time to large streams of tweets. To discuss licensing or collaboration activities, please contact us . … A component of MITRE's Social Radar suite of technologies, Author DNA performs …

Enterprise Opportunity and Risk

Publication
February 01, 2006
… about potential changes in the way we view the problem? Assuming there are new perspectives to bring to bear on this topic, what are they, and what principles might be discovered and … and acted on in advance. Here, one cannot wait until death (or even until one is sick) to buy life (health) insurance, for example. Then it’s too late. This model should be kept in mind … Wesley 1995 2nd (anniversary) expanded edition, 2nd corrected printinghttp://www.amazon.com/gp/product/customerreviews/0201835959/ref=cm_c …

Detecting Malicious Insiders in Military Networks

Publication
July 01, 2006
… Mark Maybury Given that a network is only as strong as its weakest link, a key vulnerability to network centric warfare is the threat from within. Given that a network is only as strong as … a cyber signal (e.g., digitized facility access logs). Missing Reporting (financial, travel, contact) Physical Security Cyber Security Counter Intelligence Physical Access (e.g., card door … in support of the insider threat workshop was StealthWatch. StealthWatch (http://www.lancope.com) provides traffic profiling (e.g., data flow analysis) and host profiling such as zone …

Analysis and Detection of Malicious Insiders

Publication
March 01, 2005
… Lewandowski This paper summarizes a collaborative, six month ARDA NRRC1 challenge workshop to characterize and create analysis methods to counter sophisticated malicious insiders in the … 21046 Pittsburgh, PA 15213-3890 {matzner, tomh}@arlut.utexas.edu {bwood,csibley, jamarin}@bbn.com tal@cert.org Lance Spitzner John Copeland Scott Lewandowski and Jed Haile Electrical and … handlersVices Internal Travel Wealth, Transfer to Intelligence Activity (financial, ( travel, contact) Physical Cyber External Security Security Reconnaissance Access Entrenchment …

Intellectual Property Rights for Digital Design and Manufacturing: Issues and Recommendations

Publication
August 14, 2014
… for the operation of the Intellectual Property Rights management mechanisms necessary to bring the DARPA Adaptive Vehicle Make program digital design process to maturity. ​The … access to component goods and services, proximity to consumers, and knowledge synergies” [Online]. Available: http://manufacturing.gov/nnmi.html 2 M. F. Molnar. Editor. (2013, November) … estimates the dollar cost associated with developing the IP to its current state to support a buy-versus-build analysis. Recognizing these options and the potential for disagreement over …

MITRE’s Privacy Engineering Tools and Their Use in a Privacy Assessment Framework

Publication
November 13, 2019
… a Privacy Assessment Framework Stuart Shapiro Julie S. McEwan MITRE has worked for two decades to develop resources that weave privacy risk management into the enterprise. Our Privacy … the tools, assistance with their use, or to obtain Word or PowerPoint versions of the tools, contact privacy@mitre.org . MITRE Privacy Engineering Tools Summary Guidance MITRE Privacy … made regarding a sub-element. 2 Capability Maturity Model Institute, https://cmmiinstitute.com/. https://cmmiinstitute.com/ 7 Level No. Title Description 1 Ad Hoc • The program requirement …

MITRE Immersive Vision System (MIVS)

Copyrighted
… Telepresence technologies rely on sensory input and an advanced graphical interface to give the user the impression that he or she is actually inside a made-up environment. The … to the display tracks the position of the user's head while allowing the person to move around in any direction. A wireless signal is sent from the head-tracking device to the hemispherical … to project the composite image. To discuss licensing or collaboration activities, please contact us . … Telepresence technologies rely on sensory input and an advanced graphical …

Symphony™ Automated Secure Platform License

Copyrighted
… severe weather events, disease, healthcare fraud, and poverty. Luckily, there’s another side to that complexity. Applying machine learning and other artificial intelligence tools to the vast … Symphony is an automated provisioning framework that rapidly builds secure analytic cells in the cloud for geospatial, artificial intelligence, and machine learning. Symphony accelerates … and geospatial analysis packs. To discuss licensing or collaboration activities, please contact us . … The challenges facing our world, our people, and our government are inherently …
  • First page
  • Previous page
  • …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Current page 38
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • …
  • Next page
  • Last page
Displaying 371 - 380 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links