Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

System-of-Systems Threat Model

Publication
November 06, 2018
… a System-of-Systems Threat Model that expands the financial services sector perspective to a multi-institution or sector-level view. The cyber threat model technical reports for the … report describes system-of-systems environment and threat characteristics, identifies ways in which a system-of-systems threat scenario could be used, and demonstrates the potential … Security Act of 2002 (Section 305 of PL 107-296, as codified in 6 U.S.C. 185), herein referred to as the “Act,” authorizes the Secretary of the Department of Homeland Security (DHS), acting …

Design for an Integrated Gazetteer Database: Technical Description and User Guide for A Gazetteer to Support Natural Language Processing Applications

Publication
April 01, 2006
… present version of the IGDB includes small samples of Chinese and Arabic names derived from online bilingual resources.. 3-4 3.2.3 Types Associated with each place in a gazetteer is a type … available from the Faculty of Arts and Sciences at Harvard University. This data is available online at http://www.fas.harvard.edu/~chgis/work/downloads/. Because this dataset was already …

Linear Quantum Capacitance Scaling for Lanthanide and Actinide Atoms: Analysis of Two Differing Sets of Electron Affinity Predictions

Publication
September 01, 2011
… Throughout this work, the values of I and the ground-state electron configurations are from online tables provided by the National Institute of Standards and Technology (NIST) [11, 12]. … lines could indicate a mutual inconsistency among the capacitances and, therefore, among the com- ponent A values given by Felfli et al. [4] for the nine f - scaling lanthanide atoms. On the … and K. G. Dyall, Atomic Data and Nu- clear Data Tables 67, 207 (1997). See also the expanded online tables at http://www.chem.vu.nl/~visscher/ FiniteNuclei/FiniteNuclei.htm [17] V. T. Davis, …

Factors Impeding Wiki Use in the Enterprise: A Case Study

Publication
December 01, 2009
… Damianos Daniel Weiss Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population of wiki contributors and readers, we discovered two major factors which …

Modeling and Simulation of a Ground Based Sense and Avoid Architecture for Unmanned Aircraft System Operations

Publication
June 01, 2013
… System Operations Kyle Noth Daniel Luke The safe operation of Unmanned Aircraft Systems in the National Airspace System necessitates a capability to sense and avoid other airborne objects. The Ground Based Sense and Avoid concept uses data from ground-based radars in a specially tuned tracking system to provide traffic information to manual (flight crews) or automatic collision avoidance systems. … of Unmanned Aircraft Systems in the National Airspace System necessitates a capability to sense and avoid other airborne objects. One solution is a Ground Based Sense and Avoid …

A Cyber Attack-Centric View of Commercial Space Vehicles and the Steps Needed to Mitigate

Publication
November 17, 2020
… A Cyber Attack-Centric View of Commercial Space Vehicles and the Steps Needed to Mitigate Theresa Suloway Ph.D. Scott Kordella Ph.D. Companies should implement a robust … Progress toward sharing signatures and other threat intel has progressed greatly as membership in the ISAC has increased. Further participation and sharing information among members will … Number 20-2669 A cyber attack-centric view of commercial space vehicles and the steps needed to mitigate Theresa Suloway, PhD1 and Samuel Visner2 MITRE, Mclean, VA, 22102, USA Scott …

MITRE Researchers Blaze a Shortcut to Health Data Sharing and Analysis

Impact Story
May 09, 2022
… source. “Chris Moesel’s team developed productivity tools, including learning resources, an online code playground, and a plug-in to a Virtual Studio Code [a popular development …

Generation AI Reaches 10,000 Students—and Begins a New Chapter

Impact Story
April 08, 2022
… their own fields of study.” And yet students—along with the rest of us—now use AI every day. Online searches, GPS routing, safety features on our cars, even ordering that pizza on a smart …

Information Security in the Clouds

Publication
November 01, 2010
… when implemented on a larger scale. Therefore, the same amount of investment in security buys better protec- tion [10].” Large cloud providers will benefit from these economies of scale. … multiple tenants, the provider would need to protect the privacy of all its customers, which com- plicates the ability to share information. As noted by Buck and Hanf, service-level … it has the potential for simplifying some aspects of forensics. When a physical computer is com- promised, a forensic analyst’s first task is to copy the state of the computer quickly and …

Information Feasability: Using the Concept for Planning the Information Needs of Deploying Forces

Publication
October 01, 2000
… the Force. One of the sub-tasks under the Operational Category is Task 5, Exercise Operational Com- mand and Control. The UJTL defines command and control “To exercise authority and direction … AISs is the appropriate planning which must occur for moving, installing, maintaining, and buying the required infrastructure and applications [Norman, 1997]. 5-1 Section 5 Validating …
  • First page
  • Previous page
  • …
  • Page 66
  • Page 67
  • Page 68
  • Page 69
  • Current page 70
  • Page 71
  • Page 72
  • Page 73
  • Page 74
  • …
  • Next page
  • Last page
Displaying 691 - 700 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links