Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1877

Characterizing Effects on the Cyber Adversary: A Vocabulary for Analysis and Assessment

Publication
February 04, 2014
… of cyber defender actions, architectural decisions, and selections and uses of technologies to improve cyber security, resiliency, and defensibility (i.e., the ability to address ongoing … of the DARPA Information Survivability Conference and Exposition (DISCEX’03), April 2003. [Online]. Available: http://www.bbn.com/resources/pdf/RedTeamExptsPaper- Levin10-02.pdf. [3] B. J. Wood and R. A. Duggan, "Red …

Enterprise Threat Model Technical Report-Cyber Threat Model for a Notional Financial Services Sector Institution

Publication
November 07, 2018
… Apex program, applies the expanded threat model developed in a previous publication to the institution/enterprise level reflecting attacker methods at a level relevant to … reflect official DHS opinion or policy. For more information about this publication contact: Homeland Security Systems Engineering & Development Institute The MITRE Corporation 7515 … Security (ICIW 2011), Academic Conferences Ltd., 2011. Available at http://papers.rohanamin.com/wp- content/uploads/papers.rohanamin.com/2011/08iciw2011.pdf 8. Lopez, Jose. 1999. “Using …

MITRE’s University Innovation Exchange for Space: Using Space Research to Address Enterprise-Wide Problems

Publication
January 20, 2021
… MITRE’s University Innovation Exchange for Space: Using Space Research to Address Enterprise-Wide Problems Liv Blackmon Ph.D. Scott Kordella Ph.D. Giovanna Casalino … and stakeholders for each of the five problems. A complete listing of stakeholders and their contact information may be found in 0. 2 UIX-SPACE VIRGINIA PROBLEM STATEMENTS 2.1 SOLAR POWER … "Control - Unfettered Blog," August 2010. [Online]. Available: https://www.controlglobal.com/blogs/unfettered/malicious-vs-unintentional-cyber-incidents-why-it-is- …

Log4shell and Endemic Vulnerabilities in Open Source Libraries

Publication
March 15, 2022
… David Wilburn Charles Schmidt The disclosure of a series of vulnerabilities in log4j led to many frantic weeks as cybersecurity researchers and defenders sought to stem attacks. In this … Apache Software Foundation Log4J Project, “Apache log4j 1.2 Release History,” 9 June 2012. [Online]. Available: https://logging.apache.org/log4j/1.2/changes-report.html. 3. J. Wetter and N. … Log4j Vulnerability,” 17 December 2021. [Online]. Available: https://security.googleblog.com/2021/12/understanding-impact-of-apache- log4j.html. 4. The Apache Software Foundation Log4J …

Past is Prologue: Creating a Civil Defense Mindset to Address Modern Cyber Threats

Publication
May 16, 2025
… Past is Prologue: Creating a Civil Defense Mindset to Address Modern Cyber Threats Cyber threats to the United States’ critical infrastuctures are … the Cold War to contemporary threats,” Virginia Department of Emer- gency Management, n.d. [Online]. Available: https://www.vaemergency.gov/aem/blue-book/civil-defense-from-the- … with living-off-the-land techniques,” 25 May 2023. [Online]. Available: https://www.microsoft.com/en-us/security/security-insider/emerging-threats/volt-typhoon-targets-us-criti- …

Detection Engineering in Industrial Control Systems—Ukraine 2016 Attack: Sandworm Team and Industroyer Case Study

Publication
April 04, 2022
… Detection Engineering in Industrial Control Systems—Ukraine 2016 Attack: Sandworm Team and Industroyer Case Study … and purple teaming activities. We establish technical requirements that inform analytics to implement or acquire. We extend MITRE's TCHAMP threat hunting methodology to Industrial … supported device attributes • Use of Test Link State function to determine if an outstation is online • Read file commands from a new device • Read file commands for new files from an existing …

SpatialML: Annotation Scheme, Resources, and Evaluation

Publication
December 01, 2009
… annotation editor has been developed for SpatialML, along with several annotated corpora. In adapting the extent tagger to new domains, merging the training data from the ACE corpus with annotated data in the new … databases. SpatialML also models topological relations between places, such as inclusion or contact between regions. The SpatialML guidelines indicate language-specific rules for marking up …

Obligations in Trust Negotiation

Publication
February 01, 2008
… Jeffery Puchalski Dr. Vipin Swarup Trust negotiation frameworks allow communicating parties to incrementally establish trust in one another to achieve security goals. Trust negotiation … offer a weaker form of assurance than provisions. Research has been done to show how com- mitment violations can lead to a decrease in a quantifiable trust value [4]. It is assumed … Society, 2002. [17] E. McCluskey. Algebraic minimization and the design of two-terminal contact networks. Bell System Technical Journal, 35:1417–1444, 1956. [18] Alexander Pretschner, …

MITRE's Response to the OMB RFI on FedRAMP

Publication
December 22, 2023
… MITRE's Response to the OMB RFI on FedRAMP MITRE’s data-driven responses to an Office of Management and … OMB RFI on FedRAMP December 22, 2023 For additional information about this response, please contact: Duane Blackburn Center for Data-Driven Policy The MITRE Corporation 7596 Colshire Drive … to government personnel or their delegates and is terminated within 90 days. When available online through established Government-Cloud accounts, access must be specifically requested by …

MITRE’s Response to OSTP RFI on AI Action Plan

Publication
April 01, 2025
… MITRE’s Response to OSTP RFI on AI Action Plan MITRE’s data-driven responses to an OSTP inquiry requesting input … RFI on AI Action Plan March 13, 2025 For additional information about this response, please contact: Duane Blackburn Center for Data-Driven Policy The MITRE Corporation 7596 Colshire Drive … job requirements and seize new opportunities in the AI economy. Retraining should leverage online platforms and community college partnerships, ensuring accessibility for rural and …
  • First page
  • Previous page
  • …
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Current page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • …
  • Next page
  • Last page
Displaying 541 - 550 of 1877
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links