Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Evidence-Based List of Exploratory Questions for AI Trust Engineering (ELATE)

Publication
April 14, 2023
… Questions for AI Trust Engineering (ELATE) Stephen Dorton Jeff Stanley ELATE empowers teams to ensure trustworthy artificial intelligence (AI) products throughout their development cycle. … being "observed" by an AI, what data are collected, how their data will be used, and who to contact with concerns? Example: HireView removed facial expression tracking from its interview … (30 May 2018). Tesla hit parked police car ‘while using Autopilot.’ BBC News. https://www.bbc.com/news/technology-44300952 Dorton, S.L. (2022). Supradyadic trust in artificial intelligence. …

Presentation: Extreme Privilege Escalation On Windows 8/UEFI Systems

Publication
August 06, 2014
… authors discovered in the UEFI open source reference implementation and the techniques used to exploit them. The UEFI specification has more tightly coupled the bonds of the operating … formats such as CVE, CWE, OVAL, CAPEC, STIX, TAXII, etc – The first .org, !(.mil | .gov | .com | .edu | .net), on the ARPANET © 2014 The MITRE Corporation. All rights reserved. | 3 | … updated source code Panasonic Under inspecting with IBV Other Vendors Unknown, waiting for contact info © 2014 The MITRE Corporation. All rights reserved. | 48 | Our current understanding …

Cyber Resiliency Metrics Catalog

Publication
September 03, 2018
… Bodeau Richard Graubart Rosalie McQuaid John Woodill Jr. Cyber resiliency is the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or … for Cyber-Physical Systems, Release 1.0," May 2016. [Online]. Available: https://s3.amazonaws.com/nist- … CN-S2- A3-1 Percentage of responsible organizational entities which have established points of contact, primary and alternative lines of communication, and documented procedures for responding …

MITRE Names Wen Masters as Vice President for Cyber Technologies

News Release
May 04, 2021
… Names Wen Masters as Vice President for Cyber Technologies Masters will lead programs critical to national security and protecting our infrastructure. McLean, Va., and Bedford, Mass., May 4, … MITRE and will drive cybersecurity strategy through our sponsored and independent research and in partnership with academia and industry. She will lead MITRE’s innovation centers in … industry to tackle challenges to the safety, stability, and well-being of our nation. Media Contact: Jordan Graham,  media@mitre.org MITRE Names Wen Masters as Vice President for Cyber …

Tracking COVID-19 Using Wastewater—An Early Warning System

Impact Story
September 14, 2020
… Using Wastewater—An Early Warning System Typically flushed and forgotten, the warnings in our wastewater can tell us when our health and safety are at risk. Testing of wastewater reveals the presence of hazards—from toxins to viruses, including the SARS-CoV-2 virus—excreted from our bodies. “Using wastewater … in many cases, when they arrive on campus), isolating those infected, and conducting contact tracing. “Wastewater surveillance is an inexpensive, fast, scalable method to find …

A Sum Greater Than Its Parts: Integrated Deterrence and Strategic Competition

Publication
December 05, 2023
… Parts: Integrated Deterrence and Strategic Competition Chris Bassler Brent Katz Will Kirkman To confront the complex challenges posed by China to reshape the global order, integrated … and U .S . logistics flows to key areas of need . 3 .5 Change the Interpretation of Buy America and the National Security Perimeter Implement an integrated defense industrial base … Aspen Security Forum 2023,” interviewed by Courtney Kube, July 18, 2023, https://www .youtube .com/watch?v=ds0bPWJmZxg 2 . Kurt M . Campbell and Ely Ratner, “The China Reckoning: How Beijing …

Building Groupware on THYME

Publication
June 01, 2006
… it is mediated by a computer application, requires the construction of groupware applications to mediate the collaboration. The study of collaboration within a community of users, as it is … passing properties of the components allow reasoning about their interaction. If a THYME com- ponent has a limited set of messages it reacts to, then its interaction with other … projects and how the framework was used to implement their groupware design. ORA The Online Research Assistant is an application that allows a more experienced researcher (such as a …

Exploitation of Digital Artifacts and Interactions to Enable Peer-to-Peer (P2P) Knowledge Management (KM)

Publication
October 04, 2004
… Exploitation of Digital Artifacts and Interactions to Enable Peer-to-Peer (P2P) Knowledge Management (KM) Dr. Mark Maybury This paper surveys our efforts in the automated analysis of human created digital artifacts and human computer interactions to … remainder of this article outlines the field of research at the intersection of peer-to-peer com- puting and knowledge management. We first briefly describe peer-to-peer group knowledge dis- …

Technology Assisted Stress Control (TASC)

Fact Sheet
May 27, 2024
… conditions such as depression, post-traumatic stress, and substance use disorders. This, in turn, may have a direct impact on force readiness. To address this critical issue, MITRE has developed the Technology Assisted Stress Control … and health without stigma. To learn more about MITRE’s high-tech/ high-touch approach contact, Linda Desens, Ph.D., ldesens@mitre.org and Lionel Levine, llevine@mitre.org. Through …

Rocky Road: Risks to U.S. Companies and Investors in the Chinese Financial Sector

Publication
August 22, 2024
… Rocky Road: Risks to U.S. Companies and Investors in the Chinese Financial Sector Jared Banks Will Kirkman Brian … years. By July 2022, the SEC had already identified more than 150 companies (e.g., Alibaba, JD.com, and Yum China Holdings) for failing to comply with the auditing requirements.8 Empowered by … the sale of equities, this additional measure may require state-owned enterprises to buy shares with cash repatriated from overseas. Although the Chinese government is 7MAY 2024 …
  • First page
  • Previous page
  • …
  • Page 80
  • Page 81
  • Page 82
  • Page 83
  • Current page 84
  • Page 85
  • Page 86
  • Page 87
  • Page 88
  • …
  • Next page
  • Last page
Displaying 831 - 840 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links