Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

The Risk Management Framework and Cyber Resiliency

Publication
May 06, 2016
… Bodeau When advanced cyber threats are considered, cyber resiliency can be seen as essential to achieving the goals of the Risk Management Framework. This paper presents several perspectives … level: How does cyber resiliency fit into the general risk management process defined in NIST Special Publication (SP) 800-39 [1], as applied at the organizational tier in the NIST SP … Information Security Risk: Organization, Mission, and Information System View," March 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf. [2] …

Ports, Protocols, and Services Management Process for the Department of Defense

Publication
April 01, 2005
… 2005 The overall goal of the Ports,Protocols, and Services Management Process (PPSMP) [1] is to improve both the interoperability of joint applications and the security of the overall … the IP. The IETF’s many standards documents – both draft and approved – called “Requests for Com- ment (RFC),” are at <www.ietf. org>. The core principal of the IP is that all information … receiving computer is listening for the ping and chooses to admit it is available for further contact, Software Engineering Technology Ports, Protocols, and Services Management Process for …

Models, Prediction, and Estimation of Outbreaks of Infectious Disease

Publication
February 01, 2005
… (Susceptible-Exposed-Infectious-Recovered) models have been utilized by numerous researchers to study and predict disease outbreak. Conventional SEIR … models have been used to study the outbreak of a number of infectious diseases [1, 2, 6]. In particular, difference and differential equations are the methodologies in which such models … c with the infectious population I(t) times the probability of disease transmission per contact β times the proportion of the population which is 0-XXXX-XXXX-X/05/$20.00 ©2005 IEEE …

Command and Staff Training and the Practical Use of the HLA

Publication
July 01, 2000
… program office have sponsored multiple training events using advanced simulations to drive staff training events. The suite of equipment and software to drive these events is … The primary objective of the DLRC is to train the battle staff to leverage the advances in information warfare to win the next war. It provides an environment for training leaders on … typical status message: BCT this is 2 nd Battalion, we are closing on our final objective, in contact with the enemy, currently effective with 96% equipment. Alpha company is in contact with …

Finding Cyber Threats with ATT&CK-Based Analytics

Publication
June 22, 2017
… presents a methodology for using the MITRE ATT&CK framework, a behavioral-based threat model, to identify relevant defensive sensors and build, test, and refine behavioral-based analytic … Distribution Unlimited. Case Number 16-3713. References [1] FireEye, "M-Trends 2016," [Online]. Available: https://www2.fireeye.com/rs/848-DID- 242/images/Mtrends2016.pdf. [2] S. Tomonaga, "Windows Commands Abused by …

Face Recognition Performance: Role of Demographic Information

Publication
January 01, 2012
… on gender (male and female), race/ethnicity (Black, White, and Hispanic), and age group (18 to 30, 30 to 50, and 50 to 70 years old). Experimental results demonstrate that both commercial … many researchers believe the decreased performance on other races is explained by the “contact” hypothesis, which postulates that the lower performance on other races is due to a … on a subject’s demographic cohort [3]. Among other findings, this study demonstrated for com- mercial face recognition algorithms on a dataset containing roughly 120,000 images that (i) …

When Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas

Publication
February 01, 2007
… impact on data standardization within the Department of Defense (DoD), and the ways DoD plans to create, implement, and manage standardized data assets used for information exchange. Three … (XML) family of specifications, and the creation of the Communities of Interest (COIs). In this article, we give an overview of current COI data integration processes, resultant issues … government purposes only. Please see the “Resources” listed at the end of this article for contact information if you are interested in using Harmony. How Harmony is Unique While the …

Handshake: Open Source Social Networking Platform for the Enterprise

Publication
January 01, 2010
… MITRE Corporation ■ MITRE is a private, independent, not-for-profit organization, chartered to work in the public interest ■ Founded in 1958 to provide engineering and technical services to … 0 5 10 15 20 25 30 35 40 fdle.state.fl.us associates.dhs.gov olin.edu dps.state.oh.us draper.com us.army.mil ncric.org ll.mit.edu students.olin.edu worldbank.org rand.org rit.edu sandia.gov … what we want (e.g., Affiliated Partners) ■ We can integrate (e.g., single sign on, email, contact recommender system) ■ We instrument for evaluation & research ■ Access to community ■ We …

Eight Recommendations for Congress to Improve Federal Cybersecurity

Publication
October 28, 2021
… Eight Recommendations for Congress to Improve Federal Cybersecurity Mark Peters Chris Folk Eight recommendations for congressional … with a model utilizing clear and concise priorities and measurable milestones of progress in a format conducive to Congressional oversight. 8. Require That Cybersecurity Be a Cross-Agency … degree from Virginia Tech. For information about MITRE’s FISMA expertise and capabilities, contact Chris Folk, director for MITRE’s Cybersecurity Policy and Strategic Partnerships, …

Intelligence After Next: The Future of the IC Workplace

Publication
November 04, 2020
… at a strategic decision point. The massive disruption from COVID-19 compels immediate action to break down entrenched IC barriers to working outside classified workplaces. We provide a … “COVID-19 is forcing the intelligence community to think outside the SCIF,” April 2020. [Online]. Available: https://thehill.com/opinion/national-security/490983-covid-19-is-forcing-the-intelligence-community- …
  • First page
  • Previous page
  • …
  • Page 91
  • Page 92
  • Page 93
  • Page 94
  • Current page 95
  • Page 96
  • Page 97
  • Page 98
  • Page 99
  • …
  • Next page
  • Last page
Displaying 941 - 950 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links