Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

State of the Art in Anomaly Detection and Reaction: An Update

Publication
July 01, 2000
… host monitoring, anomaly response, intrusion response iv Preface This paper is a supplement to my 1999 report on the state of the art in anomaly detection and reaction (ADR) systems [1] and … this aspect of the trend toward suites seems not to have developed. 5 Recently, PC Week Online reported that Network Associates, Inc. (NAI) would move3 toward breaking up into five … 14, 2000, Network Associates calls it quits on suite plan, PC Week Online, http://www.zdnet.com/pcweek/. 5. Allen, J., A. Christie, W. Fifthen, J. McHugh, J. Pickel, E. Stoner, December …

Creating an AI-Savvy Workforce for a Strong Future

Impact Story
February 21, 2020
… Creating an AI-Savvy Workforce for a Strong Future To strengthen America's up-and-coming workforce and future economy, MITRE is working to integrate … of fields—from the sciences to the arts. "China and other countries are investing heavily in developing artificial intelligence [AI] expertise," says MITRE's Michael Balazs. "The United … his own data science expertise, Green captured and organized data on 500 shoes from a popular online merchandiser's site. Zaidi then prepared the data for analysis, programmed …

Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations

Publication
February 25, 2016
… Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations Clement Skorupka Ph.D. Lindsley … “APT1: Exposing One of China’s Cyber Espionage Units.” 02 19 2013. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf (Accessed 09 11 2015). 5 Crowdstri e. “Global Threat Intel Report.” … (Accessed 09 11 2015). 28 Garfin el, Simson. “All About Honeypots and Honeynets.” CSO Online. 05 01 2003. …

Washington Post: With New Sponsors, ‘It’s Academic’ Lives on to Keep Quizzing High School Students

Media Coverage
June 16, 2021
… Washington Post: With New Sponsors, ‘It’s Academic’ Lives on to Keep Quizzing High School Students The Washington Post features the new sponsors for "It’s … as well as continuing our commitment to motivate students to discover, create, and lead in their communities. Fostering young talent and their interest in STEM and other disciplines is …

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration

Publication
July 01, 2008
… (AF) Command, Control, Communication, Computers, and Intelligence (C4I) systems are costly to integrate because they were not initially designed to work together. Current Air Force (AF) … Senior Systems Engineer BEA Systems tkehoe@mitre.org, inchang@mitre.org; linus.chow@bea.com Abstract Current Air Force (AF) Command, Control, Communi- cation, Computers, and … 3. “Enabling Business Agility through SOA and Federated Architectures”, available online, Defense Business Transformation, 23 July 2007 update …

Timeliness in Mesosynchronous Real-Time Distributed Systems

Publication
April 04, 2004
… Timeliness in Mesosynchronous Real-Time Distributed Systems E. Jensen Traditional real-time computing … foes depend on the timeliness properties of such systems being dependably acceptable according to application- and situation-specific criteria. The real-time research community has …

Supply Chain Attack Framework and Attack Patterns

Publication
February 21, 2014
… Patterns John Miller This paper details a study that addresses supply chain attacks relevant to Department of Defense acquisition program planning. MITRE compiled sets of data sources … engineering, together with potential application approaches for assessing malicious insertion in critical components of DoD systems being acquired or sustained.​ Supply Chain Attack Framework … + Firmware Mitigation Approach: Utilize anonymous, bulk purchase of stock components and blind buy acquisition of custom components. CM Description: When possible, avoid acquisition/purchase …

User Defined Operational Pictures for Tailored Situation Awareness

Publication
February 01, 2007
… Situation Awareness Sandeep Mulgund Seth Landsman This paper describes an effort underway to develop operational concepts and technical implementations for user defined operational … for decision-makers to support accurate situation awareness and timely decision-making in a distributed net-centric C2 environment. Net-centric C2 architectures will make available a … ESC (2005). “Strategic Technical Plan v2.0”, USAF Electronic Systems Center. Available online at http://herbb.hanscom.af.mil/hot_buttons/STP/ESC_STP_v2_0_PR.pdf. Hammersley, B. (2005). …

Cyber Resiliency Framework and Cyber Survivability Attributes

Publication
January 05, 2024
… – cyber resiliency design principles, techniques, implementation approaches, and controls to the Cyber Survivability Attributes (CSAs) defined by the Cyber Survivability Endorsement … and T. Andress, "Cyber Survivability for Future and Legacy DoD Weapon Systems," 10 June 2021. [Online]. Available: https://www.ndia.org/- … Defense," MITRE-Engenuity, 15 December 2020. [Online]. Available: https://medium.com/mitre-engenuity/security-control-mappings-a-bridge-to-threat- informed-defense-2e42a074f64a. …

Getting Data to Applications: Why We Fail, How We Can Do Better

Publication
August 01, 2000
… Getting Data to Applications: Why We Fail, How We Can Do Better Arnon Rosenthal Ph.D. Frank Manola Dr. Scott … of "transparent access," making all data available to all consumers (users and applications), in a way the consumer can interpret, anywhere and at any time. Many initiatives, governmental and … It enables progress to be driven by local efforts, which consist mainly of providing thorough, on-line self-descriptions. • Metadata (e.g., self-description) providers must benefit soon from …
  • First page
  • Previous page
  • …
  • Page 69
  • Page 70
  • Page 71
  • Page 72
  • Current page 73
  • Page 74
  • Page 75
  • Page 76
  • Page 77
  • …
  • Next page
  • Last page
Displaying 721 - 730 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links