Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1877

CALDERA

Copyrighted
… system that can reduce resources needed by security teams for routine testing, freeing them to address other critical problems.  CALDERA can be used to test endpoint security solutions and … network’s security posture against the common post-compromise adversarial techniques contained in the ATT&CK model. CALDERA leverages the ATT&CK model to identify and replicate adversary … and response of adversary behavior.   To discuss licensing or collaboration activities, please contact us .   … Measuring aspects of a network’s security posture through penetration testing, …

APE: Intrusion Protection System for Android Devices

Copyrighted
… Unlike common laptop and desktop security products, current Android defenses are unable to proactively prevent network-based attacks. To bridge this gap, MITRE developed a patented … for Android devices (known as APE), which prevents attacks before they occur. APE exists in the form of an ordinary user space application on a device and performs deep packet inspection … to search for vulnerabilities. To discuss licensing or collaboration activities, please contact us . … Unlike common laptop and desktop security products, current Android defenses are …

Periodic Mobile Forensics

Copyrighted
… is becoming ubiquitous within both government and industry, despite the devices’ vulnerability to malicious activity. As more sensitive enterprise information becomes available and accessible … potentially leave sensitive data exposed. Without an effective corporate monitoring solution in place for these mobile devices, organizations will continue to lack the ability to determine … central auditing system. To discuss licensing or collaboration activities, please contact us . MITRE's Periodic Mobile Forensics detects malicious activities on smartphones that …

Battle Networks, Innovation, and Kill Chains for the Future Fight

Publication
September 22, 2020
… and Kill Chains for the Future Fight Greg Grant How can future leadership of DoD do more to effectively counter peer adversaries and their emerging capabilities? Three ideas for moving … What do hypersonics, 5G, quantum computing, data analytics, and artificial intelligence have in common? They are all examples of the Department of Defense creating organizations or … giant user bases that will take a first product, use it, break it, provide feedback, and then buy it again. DoD needs to find a way to capture the key elements of that process without that …

Charting Complex, Dynamic and Extra-Orbital Space Operations

Publication
November 05, 2020
… have been largely focused on satellite activity around the earth. The picture was only dynamic to the extent that new objects would be added, and occasionally updated, and retired objects … 2 is necessary to inform distributed decision making. Additionally, operators must also be in contact with each other for shared understanding of how their actions effect the decisions of … tech for orbital awareness," BBC News, 16 September 2020. [Online]. Available: https://www.bbc.com/news/science-environment-54167478. [11] S. N. M. L. P. K. David Murakami, "Space Traffic …

1-2-3 Invest: Frame of Reference for Public-Sector and Non-Profit Investment Selection Studies

Publication
October 01, 2001
… Investment Selection Studies Kenneth Kuskey Investment selection studies are conducted to develop, analyze, recommend, and choose the investments an organization will make. Investment … Investment Operations & Support Integration PEGs POM Working Group Prgm Review Group Order Of Buy Draft POM 25 * In organizing investment options for a complex selection, we use decision … of Strathclyde Graduate Business School, Glasgow, Scotland. 45 See the website www.gdss.com for further information. 32 Probabilistic Models When the same new investment may produce a …

An Early Look at the UML Profile for Schedulability, Performance, and Time for Engineering Large Scale Airborne C2ISR Platforms

Publication
July 04, 2004
… Surveillance, and Reconnaissance (C2ISR) aircraft. This activity applied the Profile in analysis of a multi-aircraft scenario, loosely based on DARPA's AMSTE research program. In this configuration, two aircraft, each with sensing capability, collaborate in real-time to develop precision targeting information for ground targets which is sent directly to in-flight …

Sisyphus On the Mountaintop–Acquisition Reform: Past and Future

Publication
November 19, 2024
… Sisyphus On the Mountaintop–Acquisition Reform: Past and Future Dan Ward This follow-on to a 2009 paper on acquisition reform failures highlights the surprising amount of improvements in defense acquisitions in that time, particularly over the past five years. In "Sisyphus on the … https://www.defenseone.com/technology/2024/07/meet-air-forces-secretive-long-range-drone-flies-days/397816/ …

Global Security and Stability

… Security and Stability Global Security and Stability Connecting allies and partner nations to transformative security and defence solutions at speed and scale.  In this section Fostering … Five First Steps to a Modern Defense Budgeting System Aug 8, 2022 Publication Pentagon: Buy Commercial Already Feb 24, 2022 Publication Arming the Eagle, Outpacing the Dragon: … architectures. Select fact sheet: International Space Domain Awareness Infrastructure Platform Contact Us Reach out for more information about our work.   Get in Touch Sign up for the MITRE …

October 2016 Federal Mobile Computing Summit Report

Publication
February 28, 2017
… that afforded industry, government, academic, and FFRDC representatives an opportunity to collaborate, and discuss prominent challenge areas in mobility. The Federal Mobile Computing … new authentication technologies that have the backing of industry, such as the Fast Identity Online (FIDO) protocol, will help identify solutions that meet governments’ requirements. … Protection Profiles • IoT failing safely • Mobile Med PAC pack vehicle • IOT Security • Smart Contact Lens • UAS + Mobile / Drones 3.3 Identity and Access Management: Moving Towards …
  • First page
  • Previous page
  • …
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Current page 46
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • …
  • Next page
  • Last page
Displaying 451 - 460 of 1877
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links