Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

State of the Art in Anomaly Detection and Reaction

Publication
July 01, 1999
… State of the Art in Anomaly Detection and Reaction Leonard LaPadula This paper presents a view of the state of the art in anomaly detection and reaction technology. This paper presents a view of the state of the art in anomaly detection and reaction technology. The paper develops the view from six sources: three … Real-time reaction capability in monitoring tools is generally provided in the form of online alerting, e-mail notification, connection termination, and SNMP traps; a few tools can …

New Advanced RAIM with Improved Availability for Detecting Constellation-wide Faults, Using Two Independent Constellations

Publication
March 13, 2013
… a multi-dimensional look-up table, which is then used to determine the PL via interpolation in online processing. Subsequently, the NIORAIM concept was applied by the same authors to handle … table off-line, which is then used to calculate the weights and the PL via interpolation in online processing. A comparison of VPLs, calculated for the OWAS method, with those tabulated for …

Recommendations for Managing Software Reuse

Publication
September 01, 2009
… criteria to incentivize desirable contractor behaviors pertaining to software reuse Points of Contact Questions regarding this handbook, requests for subject matter expert support, and … risk questions explore software reuse risks to be considered before source selection and after contact award as the design evolves. To identify the risks during a source selection, the Guide …

Response of The MITRE Corporation to the National Science and Technology Council’s Request for Information on Artificial Intelligence R&D

Publication
October 31, 2018
… Response of The MITRE Corporation to the National Science and Technology Council’s Request for Information on Artificial … AI R&D Strategic Plan. Artificial Intelligence (AI) is going to play a significant role in the Fourth Industrial Revolution, where technological capabilities will blur the lines between … Unlimited. Case Number: 18-2319-15 MP180840 October 25, 2018 Response of The MITRE Corporation to the National Science and Technology Council’s Request for Information on Artificial …

Effective EOP Leadership: Learned Guidance for an Incoming Appointee

Publication
March 04, 2024
… This guide provides leadership principles and best practices for incoming appointees in the Executive Office of the President (i.e., the White House) based on the author's eight years of experience. Welcome to the Executive Office of the President (EOP), a place where history is made and the future is … its new appointees, which can significantly hinder your chances of success. This document aims to help overcome that gap, offering insights into EOP-focused leadership principles and learned …

Enabling Capabilities for Tactical Edge Networking

Publication
April 14, 2009
… are appropriate Unicast Routing – leveraging NASA work in scheduled routing: – NASA work in Contact Graph Routing (CGR) uses static contact schedules to route messages – MITRE will examine extending this work into a dynamic …

CISA Issues Guidance for Using MITRE ATT&CK for Cyber Threat Intelligence

News Release
June 02, 2021
… Engineering and Development Institute TM  (HSSEDI), which worked with the MITRE ATT&CK ® team, to issue guidance to help cyber threat intelligence analysts make better use of MITRE ATT&CK. … report on security threats. Understanding adversary behavior is often a critical initial step in protecting networks and data, and the success that defenders have in spotting and mitigating … industry to tackle challenges to the safety, stability, and well-being of our nation. Media Contact: Jeremy Singer,  media@mitre.org CISA Issues Guidance for Using MITRE ATT&CK for Cyber …

The Role of a Framework of Legal Instruments in the Establishment of Effective International Regional Cyber Information Sharing

Publication
October 01, 2012
… International Regional Cyber Information Sharing Michael Aisenberg This report provides advice to support organizations for collecting and sharing of Cyber Information, especially information … attacks and other exploits against networks. This report provides advice and direction to support the development of organizations, and capabilities within organizations for the … especially information about threats, risks, vulnerabilities, attacks, as well as defenses to service disruptions, intrusions and other exploits against electronic information networks and …

Deep STARE Technical Advancements and Status

Publication
October 01, 2003
… arrays, has a signal amplifier on-board the chip. The architecture includes a buried contact where the signal is transferred from the chip’s surface structures, through a poly-silicon layer, to a contact on the opposing side. The construction of the buried contacts involves etching a hole which is then filled with conductive material. The chosen method …

Cyber Exercise Playbook

Publication
November 15, 2014
… Execution: 3–5 days Requires more people and time, real targets for scenarios, deconfliction contacts Organizations familiar with inter- organization exercises and a strong knowledge of … number of organizational participants, IT resources, travel budget for meetings, deconfliction contacts Organizations familiar with exercises, RTs, and their own organizational objectives … by placing a note in the on-screen txt editor that the computer has been compromised and to contact cyber security. 01, 02, 04, 07, 08, 09, 10, 12 02, 03, 06, 07, 08, 10 IA-7 Frequency …
  • First page
  • Previous page
  • …
  • Page 80
  • Page 81
  • Page 82
  • Page 83
  • Current page 84
  • Page 85
  • Page 86
  • Page 87
  • Page 88
  • …
  • Next page
  • Last page
Displaying 831 - 840 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links