scispace - formally typeset
Search or ask a question
Institution

Mitre Corporation

CompanyBedford, Massachusetts, United States
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.


Papers
More filters
Journal ArticleDOI
01 Sep 1997
TL;DR: The principal hypothesis was that decision procedures trained to execute a set of simple decision procedures would be vulnerable-to-bias, and would therefore be more vulnerable to the effects of time stress than other decision procedures.
Abstract: This experiment investigates the impart of time stress on the decision making performance of command and control teams. Two person teams were trained to execute a set of simple decision procedures. Some of these procedures required subjects to make judgments that were inconsistent with normal heuristic decision processing. The principal hypothesis was that these decision procedures would be vulnerable-to-bias, and would therefore be more vulnerable to the effects of time stress than other decision procedures. The results support this hypothesis. In addition, the results suggest that the subjects adapted inappropriately to time stress. As time stress increased, they began to use a decision processing strategy that was less effective than the strategy they were trained to use.

108 citations

Proceedings ArticleDOI
Barbara Liskov1
05 Dec 1972
TL;DR: Any user of a computer system is aware that current systems are unreliable because of errors in their software components.
Abstract: Any user of a computer system is aware that current systems are unreliable because of errors in their software components. While system designers and implementers recognize the need for reliable software, they have been unable to produce it. For example, operating systems such as OS/360 are released to the public with hundreds of errors still in them.

108 citations

Journal ArticleDOI
TL;DR: It is shown that the elastic net approach can produce a more accurate estimate of the distribution of dielectric properties within an anatomically realistic 3-D numerical breast phantom than the DBIM with an l 2 penalty, which produces an estimate which suffers from multiple artifacts.
Abstract: We investigate solving the electromagnetic inverse scattering problem using the distorted Born iterative method (DBIM) in conjunction with a variable-selection approach known as the elastic net. The elastic net applies both l 1 and l 2 penalties to regularize the system of linear equations that result at each iteration of the DBIM. The elastic net thus incorporates both the stabilizing effect of the l 2 penalty with the sparsity encouraging effect of the l 1 penalty. The DBIM with the elastic net outperforms the commonly used l 2 regularizer when the unknown distribution of dielectric properties is sparse in a known set of basis functions. We consider two very different 3-D examples to demonstrate the efficacy and applicability of our approach. For both examples, we use a scalar approximation in the inverse solution. In the first example the actual distribution of dielectric properties is exactly sparse in a set of 3-D wavelets. The performances of the elastic net and l 2 approaches are compared to the ideal case where it is known a priori which wavelets are involved in the true solution. The second example comes from the area of microwave imaging for breast cancer detection. For a given set of 3-D Gaussian basis functions, we show that the elastic net approach can produce a more accurate estimate of the distribution of dielectric properties (in particular, the effective conductivity) within an anatomically realistic 3-D numerical breast phantom. In contrast, the DBIM with an l 2 penalty produces an estimate which suffers from multiple artifacts.

107 citations

Posted Content
TL;DR: In this paper, the authors present a wide-scale study of MAC address randomization in the wild, including a detailed breakdown of different randomization techniques by operating system, manufacturer, and model of device.
Abstract: MAC address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology, however, has been sporadic and varied across device manufacturers. In this paper, we present the first wide-scale study of MAC address randomization in the wild, including a detailed breakdown of different randomization techniques by operating system, manufacturer, and model of device. We then identify multiple flaws in these implementations which can be exploited to defeat randomization as performed by existing devices. First, we show that devices commonly make improper use of randomization by sending wireless frames with the true, global address when they should be using a randomized address. We move on to extend the passive identification techniques of Vanhoef et al. to effectively defeat randomization in ~96% of Android phones. Finally, we show a method that can be used to track 100% of devices using randomization, regardless of manufacturer, by exploiting a previously unknown flaw in the way existing wireless chipsets handle low-level control frames.

107 citations

Book ChapterDOI
05 Sep 2007
TL;DR: In this article, the authors developed an approach for detecting insiders who operate outside the scope of their duties and thus violate need-to-know, based on information from public cases, consultation with domain experts, and analysis of a massive collection of information-use events and contextual information.
Abstract: Malicious insiders do great harm and avoid detection by using their legitimate privileges to steal information that is often outside the scope of their duties. Based on information from public cases, consultation with domain experts, and analysis of a massive collection of information-use events and contextual information, we developed an approach for detecting insiders who operate outside the scope of their duties and thus violate need-to-know. Based on the approach, we built and evaluated elicit, a system designed to help analysts investigate insider threats. Empirical results suggest that, for a specified decision threshold of .5, elicit achieves a detection rate of .84 and a false-positive rate of .015, flagging per day only 23 users of 1, 548 for further scrutiny. It achieved an area under an roc curve of .92.

106 citations


Authors

Showing all 4896 results

NameH-indexPapersCitations
Sushil Jajodia10166435556
Myles R. Allen8229532668
Barbara Liskov7620425026
Alfred D. Steinberg7429520974
Peter T. Cummings6952118942
Vincent H. Crespi6328720347
Michael J. Pazzani6218328036
David Goldhaber-Gordon5819215709
Yeshaiahu Fainman5764814661
Jonathan Anderson5719510349
Limsoon Wong5536713524
Chris Clifton5416011501
Paul Ward5240812400
Richard M. Fujimoto5229013584
Bhavani Thuraisingham5256310562
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

83% related

Carnegie Mellon University
104.3K papers, 5.9M citations

83% related

George Mason University
39.9K papers, 1.3M citations

83% related

Georgia Institute of Technology
119K papers, 4.6M citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20234
202210
202195
2020139
2019145
2018132