scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Proceedings ArticleDOI
26 Oct 1997
TL;DR: In this article, the authors introduce a recently developed tool, the Detailed Policy Assessment Tool (DPAT), and use it to explore delay and the predictability of delay using some simple scenarios for NAS growth.
Abstract: Congestion-induced delay is one of the recognized metrics for assessing performance in the National Airspace System (NAS). Delay can arise from many causes, including factors specific to airline operations as well as factors that can be traced to NAS operations. In this paper we introduce a recently developed tool, the Detailed Policy Assessment Tool (DPAT), and use it to explore delay and the predictability of delay using some simple scenarios for NAS growth.

31 citations

Journal ArticleDOI
TL;DR: ATSPECT offers functionality and security guarantees akin to the purchase request, payment authorization, and payment capture phases of SET, the secure electronic transaction standard created by the major credit card firms.
Abstract: We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined with encryption to achieve authentication and freshness. ATSPECT offers functionality and security guarantees akin to the purchase request, payment authorization, and payment capture phases of SET, the secure electronic transaction standard created by the major credit card firms.

31 citations

Proceedings ArticleDOI
13 Sep 2000
TL;DR: This work exploits chunking in two principal ways: first, as part of the authors' extraction system (Alembic) (Aberdeen et al., 1995), the chunker delineates descriptor phrases for entity extraction; and, as a part of the ongoing research in parsing, chunks provide the first level of a stratified approach to syntax.
Abstract: For several years, chunking has been an integral part of MITRE's approach to information extraction. Our work exploits chunking in two principal ways. First, as part of our extraction system (Alembic) (Aberdeen et al., 1995), the chunker delineates descriptor phrases for entity extraction. Second, as part of our ongoing research in parsing, chunks provide the first level of a stratified approach to syntax - the second level is defined by grammatical relations, much as in the SPARKLE effort (Carroll et al., 1997).

31 citations

Journal ArticleDOI
TL;DR: The methods and models that compose Cyber Security Game, a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level are discussed.
Abstract: This paper describes the Cyber Security Game (CSG). Cyber Security Game is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber environment by minimizing its mission risk. The risk score is calculated by using a mission impact model to compute the consequences of cyber incidents and combining that with the likelihood that attacks will succeed. The likelihood of attacks succeeding is computed by applying a threat model to a system topology model and defender model. Cyber Security Game takes into account the widespread interconnectedness of cyber systems, where defenders must defend all multi-step attack paths and an attacker only needs one to succeed. It employs a game theoretic solution using a game formulation that identifies defense strategies to minimize the maximu...

31 citations

Journal ArticleDOI
TL;DR: In this paper, the emergence of a novel influenza virus and its spread to the United States were simulated for February 2009 from 55 international metropolitan areas using three basic reproduction numbers (R(0)): 1.53, 1.70, and 1.90).

31 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132