Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: symposium

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

359

A Coordination Model for Attack Graphs

Publication
June 28, 2023
… Jeannette M Wing. Automated generation and analysis of attack graphs. In Proceedings 2002 IEEE Symposium on Security and Privacy, pages 273–284. IEEE, 2002. 22 [25] Oleg Sheyner and Jeannette Wing. Tools for generating and analyz- ing attack graphs. In International symposium on formal methods for components and objects, pages 344–371. Springer, 2003. [26] Orly …

Information Feasability: Using the Concept for Planning the Information Needs of Deploying Forces

Publication
October 01, 2000
… written for presentation at the 5th International Command and Control Research and Technology Symposium (ICCRTS), Canberra, Australia. The 5th ICCRTS is co-sponsored by the Assistant … Department of Defence, Defence Science and Technology Organisation. The theme of the symposium is "Thinking Together". The CCRP focuses upon improving both the state of the art and …

Analysis of a Measured Launch

Publication
June 01, 2007
… Implemen- tation of a TCG-based Integrity Measurement Architecture Proc.13th USENIX Security Symposium, August, 2004 [9] J. McCune, B. Parno, A. Perrig, M. Reiter, and A. Seshadri Minimal TCB Code Execution (Extended Abstract) 2007 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2007, pp. 267-272 [10] L. deMoura, Sam …

Protocol Independence Through Disjoint Encryption

Publication
March 01, 2000
… Needham. Prudent engineering practice for cryptographic protocols. In Proceedings, 1994 IEEE Symposium on Research in Security and Privacy, pages 122–136. IEEE, IEEE Computer Society Press, … D. Guttman and F. Javier THAYER Fábrega. Authen- tication tests. In Proceedings, 2000 IEEE Symposium on Security and Privacy. May, IEEE Computer Society Press, 2000. 9 [8] Joshua D. … the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings, 1999 IEEE Symposium on Security and Privacy. IEEE Com- puter Society Press, May 1999. [20] Catherine …

An Analysis of the Nonlinear Spectral Mixing of Didymium and Sodalime Glass Beads Using Hyperspectral Imagery (HSI) Microscopy

Publication
May 07, 2014
… albedo transformation applied to airborne imaging spectrometer data. The International Symposium on Spectral Sensing Research, San Diego, California, CD-ROM, 7 p. ©2014 Society of … finding hyperspectral endmembers. Proceedings of the IEEE International Geoscience and Remote Symposium (IGARSS 2007), Barcelona, Spain, doi:10.1109/IGARSS.2007.4423675, pp. 3817-3820. [27] … least squares abundance estimates. Proceedings of the IEEE International Geoscience and Remote Symposium (IGARSS 2007), Barcelona, Spain, doi:10.1109/IGARSS.2007.4423736, pp. 4041-4044. [28] …

Presentation: Management and Governance of MITRE's IT/KM Services

Publication
October 15, 2014
… resources MII Publish & Share folders MII launched Phonebook MII prototype First Technology Symposium MII Content Team Technical Exchange Meetings Assessment of KM baseline KM Director & …

Pervasive and Ubiquitous Computing in a Corporate Conference Room

Publication
September 04, 2004
… Proceedings, Proceedings of the Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004. [WANT2002] Want, R. et al. “Disappearing Hardware” IEEE Pervasive …

Command Authority & Information Flows in Net-Centric Operations

Publication
March 01, 2006
… Information Systems For Network-Centric Warfare”, in Proc. 8th Int. C2 Research and Technology Symposium, Washington, DC, June 2003. http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/078.pdf … of Least-Privilege Incompatibilities”, Proceedings of Network and Distributed System Security Symposium, February 2005. 17 February 2006 …

Comparing Situation Awareness for Two Unmanned Aerial Vehicle Human Interface Approaches

Publication
June 01, 2006
… single-display aviation control of UAVs.” In Proceedings of SPIE DSS06 - Defense and Security Symposium, Kissimmee, FL, USA. April 17-21, 2006. [5] M. H. Draper, G. L. Calhoun, M. J. Patzek., … awareness metrics.” In Proceedings of the 2002 Command and Control Research and Technology Symposium, Monterey, CA., 2002. [16] NASA Goddard Space Flight Center. Web page for search and …

Advanded Distributed Learning in Support of Future Joint Operations

Publication
October 01, 2001
… Jan 2001 19 B. Goodman, “Intelligent Agents for Dis- tance Learning” at MITRE 2001 Technology Symposium, 6 June 2001. 20 J. Tyler “ABCS DL Demonstration” pres- entation 8 November 2000. 21 … p.181 24 G. Klein, “Command Decision Training Support Technology” at MITRE 2001 Tech- nology Symposium, 6 June 2001. 25 ADL p.47 26 DSB p.20 27 D. Morey, T. Frangioso, “Aligning an or- …
  • First page
  • Previous page
  • …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Current page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • …
  • Next page
  • Last page
Displaying 71 - 80 of 359
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links