Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Cyber Resiliency Engineering Aid—The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques

Publication
May 15, 2015
… that systems engineers and architects can use when deciding which cyber resiliency techniques to apply. Cyber resiliency is the ability of cyber systems and cyber-dependent missions to … Graubart, "Cyber Resiliency Engineering Framework (MTR110237, PR 11-4436)," September 2011. [Online]. Available: http://www.mitre.org/sites/default/files/pdf/11_4436.pdf. [2] D. Bodeau and … Dictionary," Encyclopedia Britannica, 2015. [Online]. Available: http://www.merriam-webster.com/dictionary/system. [5] CNSS, "National Information Assurance (IA) Glossary (CNSS Instruction …

ISA or not ISA: The Interlingual Dilemma for Machine Translation

Publication
August 01, 2000
… of an interlingual, or language-independent, representation. We present challenges and issues in developing this representation, particularly the notion of language-independence. Finally, we recommend a potentially more effective approach to developing lexical components based on the bizarre system model. ISA or not ISA: The … [reachable (OBJ1)] [have(AGENT, OBJ2] Preparatory_spec: [get (AGENT, OBJ1)] Termination_cond: [contact (OBJ1, OBJ2)] Post_assertions: [contact (OBJ1, OBJ2)] Path, duration, motion, force …

Achieving Mission Assurance for Enterprises Today and Tomorrow: Zero Trust, The Cloud, and Other Tools

Publication
April 01, 2021
… how combining Zero Trust Architecture with emerging cloud and AI technologies is a better way to protect the modern enterprise against cybersecurity threats. This MITRE white paper covers … MISSION ASSURANCE FOR ENTERPRISES TODAY AND TOMORROW 1. Grand Prix History, “Bugatti 35,” [Online]. http:// grandprixhistory.org/bug35.htm. [Accessed March 18, 2021]. 2. Cybersecurity … Insiders, “2020 Insider Threat Report,” 2019. [Online]. https://www.cybersecurity-insiders.com/ wp-content/uploads/2019/11/2020-Insider-Threat-Report- Gurucul.pdf. [Accessed March 18, …

An Exploratory Study on Interfacing the Simulation Training Exercise Platform with Operational Simulators

Publication
October 25, 2018
… This report introduces a mature cyber-domain technology called STEP as a potential solution to a long-standing problem facing the simulation community. It discusses the benefits and hurdles … is to trace the effect-impact relationship between the cyber and operational domains in the simulation environment. STEP has gained traction within the DoD, where it is being applied … their interest in STEP and identify suitable operational simulators for study. The Point-of-Contact (POC) for Army Research Lab (ARL) Survivability Lethality Analysis Directorate (SLAD), …

Hyperspectral Imagery and LiDAR for Geological Analysis of Cuprite, Nevada

Publication
April 01, 2009
… However, the LiDAR resolution (~1 meter ground sampling distance) is likely too coarse to extract surface texture properties of clay minerals in some of the alluvial fans captured in … west of the US-95 road. The mean elevation of the site is 1.55 kilometers above sea level. * Contact information: (703) 983-6880, mwest@mitre.org † Contact information: (703) 735-2793, … over the area of interest (outlined on the map). (Map credit: © 2004 DeLorme (www.delorme.com) Topo USA®.) One data set covering the area of interest was chosen from each of the two …

The Risk Management Framework and Cyber Resiliency

Publication
May 06, 2016
… Bodeau When advanced cyber threats are considered, cyber resiliency can be seen as essential to achieving the goals of the Risk Management Framework. This paper presents several perspectives … level: How does cyber resiliency fit into the general risk management process defined in NIST Special Publication (SP) 800-39 [1], as applied at the organizational tier in the NIST SP … Information Security Risk: Organization, Mission, and Information System View," March 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf. [2] …

Off-Grid Communications with Android

Publication
July 01, 2012
… implementation of a generalized Mobile Ad-Hoc Network framework. The project's goals are to bring dynamic mesh networking to smart phones and to explore the concepts of Off-Grid … beyond capacity and Wi-Fi hotspots are reliant on power and network connectivity, two things in short availability during a disaster or catastrophic event. We’ve seen these issues surface … term. We expect to harden our security posture both for network and data protection. Please contact the SPAN team if you have any questions, comments or concerns. Also, please contact us if …

A Brief Overview of Nanoelectronic Devices

Publication
January 01, 1998
… James Ellenbogen This paper surveys and explains nanometer-scale, quantum-effect alternatives to micron-scale, bulk-effect transistors in digital circuits. The status of R&D and recent important advances are reviewed briefly. A … quantum well on the island may exhibit several possible energy levels. 3 ~10-100nm (a) Metal Contact Metal Contact DrainIslandSource Tunnel Barriers (b) Energy Distance “Potential Energy …

Finding Cyber Threats with ATT&CK-Based Analytics

Publication
June 22, 2017
… presents a methodology for using the MITRE ATT&CK framework, a behavioral-based threat model, to identify relevant defensive sensors and build, test, and refine behavioral-based analytic … Distribution Unlimited. Case Number 16-3713. References [1] FireEye, "M-Trends 2016," [Online]. Available: https://www2.fireeye.com/rs/848-DID- 242/images/Mtrends2016.pdf. [2] S. Tomonaga, "Windows Commands Abused by …

Meta Data Concepts to Support a Net-Centric Data Environment

Publication
February 01, 2005
… Meta Data Concepts to Support a Net-Centric Data Environment Kenneth Laskey, Ph.D. The term metadata is often … focus on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services; … and a brief description of the function each provides: • Person/Organization – identity and contact information for a person or organization (using concept metadata such as name, address, …
  • First page
  • Previous page
  • …
  • Page 93
  • Page 94
  • Page 95
  • Page 96
  • Current page 97
  • Page 98
  • Page 99
  • Page 100
  • Page 101
  • …
  • Next page
  • Last page
Displaying 961 - 970 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links