Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

Detection Engineering in Industrial Control Systems—Ukraine 2016 Attack: Sandworm Team and Industroyer Case Study

Publication
April 04, 2022
… Detection Engineering in Industrial Control Systems—Ukraine 2016 Attack: Sandworm Team and Industroyer Case Study … specific detections. The output of this process is a set of usable analytics ranging in maturity from proof-of-concept to ready-for-production deployment. We build upon work where … discuss lessons learned for future ICS detection engineering efforts. Detection Engineering in Industrial Control Systems—Ukraine 2016 Attack: Sandworm Team and Industroyer Case …

SLEAK: A Side-channel Leakage Evaluator and Analysis Kit

Publication
November 28, 2014
… theory, but in practice are difficult to implement properly due to issues such as unexpected com- piler transformations and/or platform-specific leakage sources. Although several recent … have been previously overlooked as being computationally infeasible due to the difficulty of com- puting the full distributions of intermediate values. In this section we show that in some … Computer Science, O. Dunkelman, Ed. Springer Berlin Heidelberg, 2012, vol. 7178, pp. 19–34. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-27954-6 2 [4] P. C. Kocher, “Timing …

Strategic Economics in Practice: Operational Planning

Publication
June 20, 2024
… Strategic Economics in Practice: Operational Planning Talia Gifford Isaac Harris Eva-Marie Etzel Jim Hickey Chris … underpinning victory in the event of a conflict. As the Chinese Communist Party (CCP) seeks to shape and revise the international political and economic order, the United States must … Deterrence and Strategic Competition , we argued the importance of integrated deterrence to the United States’ response to Chinese aggression and identified the economic domain as …

A Sensible Regulatory Framework for AI Security

Publication
June 14, 2023
… AI. With AI technologies growing at a staggering rate, the time is now to put best practices in place to promote AI for public good. We’re drawing on six decades of experience advancing cyber and AI in the defense and civil domains and forging strategic collaborations with government, industry, and academia to inform sensible AI regulation in the near- and long-term. We recommend where to place guardrails to best shape AI development …

CALDERA

Copyrighted
… system that can reduce resources needed by security teams for routine testing, freeing them to address other critical problems.  CALDERA can be used to test endpoint security solutions and … network’s security posture against the common post-compromise adversarial techniques contained in the ATT&CK model. CALDERA leverages the ATT&CK model to identify and replicate adversary … system that can reduce resources needed by security teams for routine testing, freeing them to address other critical problems.  CALDERA can be used to test endpoint security solutions and …

Cyber Resiliency Assessment: Enabling Architectural Improvement

Publication
May 01, 2013
… Improvement Deborah Bodeau Richard Graubart Cyber resiliency assessments are intended to identify where, how, and when cyber resiliency techniques can be applied to improve architectural resiliency against advanced cyber threats. Cyber resiliency assessments are intended to identify where, how, and when cyber resiliency techniques can be applied to improve … Released as Open Source Software," 30 June 2010. [Online]. Available: http://www.ciena.com/corporate/news- …

Aviation intercommunication system to mobile computing device interface

Tue, 06/11/2019 - 12:00
Patented
… Aviation intercommunication system to mobile computing device interface Aviation intercommunication system to mobile computing device interface Tue, 06/11/2019 - 12:00 Transportation Patented An interface … between an aviation intercommunication system and a mobile computing device is provided. In one or more example, the interface device can be configured to minimize noise that can … An interface device configured to coordinate signals between an aviation intercommunication system and a mobile computing device …

Identifying and Mitigating Cyber Threats to Financial Systems

Impact Story
September 17, 2019
… Identifying and Mitigating Cyber Threats to Financial Systems When DHS launched its Apex Program to address key current and future … the most crucial of the critical infrastructure sectors, or CI, is one that largely lives online: the financial services sector . According to the Department of Homeland Security, CI … federal payments, and mortgages to the stock market, credit card charging, and beyond—fall in the "vital" category. And with repeated reports about attacks on financial institutions in the …

A Call to Action: A National Strategy for Digital Health

Publication
March 01, 2022
… A Call to Action: A National Strategy for Digital Health Christine Cassel MD Wyatt Decker MD Jonathan … digital health efforts across the public and private sectors to create a massive improvement in the health and well-being of people. With proper leadership, 2021 can become a significant … now. Read the related story and the full draft of  National Strategy for Digital Health .  Contact us   to deliver feedback on the draft document or schedule a discussion. A Call to …

MITRE Uses Earth Shadow to Determine Satellite Range

Impact Story
January 15, 2020
… MITRE Uses Earth Shadow to Determine Satellite Range Until now, determining the orbit of satellites has required many … idea starts this easily. MITRE’s Kevin Schafer was with a group of engineers who specialize in satellite tracking, watching footage from the night before. As a satellite disappeared into … many measurements or multiple telescopes. A team of MITRE scientists took their equipment to Chile to view an eclipse—and proved an easier way. …
  • First page
  • Previous page
  • …
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • Current page 43
  • Page 44
  • Page 45
  • Page 46
  • Page 47
  • …
  • Next page
  • Last page
Displaying 421 - 430 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links