Adversary

(redirected from adversaries)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia, Wikipedia.
Related to adversaries: adversities

Adversary

The other side in litigation. For example, in a lawsuit, the plaintiff and the defendant are adversaries with respect to each other.
References in periodicals archive ?
The Endgame Cyber Operations Platform, developed for elite US DOD cyber protection teams, enables enterprises to automate the entire hunt mission, detecting and blocking adversaries at every phase of the cyber kill chain.
18) Our adversaries have seen the publicly reported difficulty the United States has encountered in finding and killing mobile targets in its recent wars; thus, missile mobility is of key importance.
If adversaries acknowledge their share of responsibility for the conflict and its resolution, they get a positive score.
HP Threat Central, developed with HP Labs, provides a collaborative security intelligence platform that enables community members to share threat data and analysis, providing real-time intelligence on the adversaries, attack vectors, methods and motivations behind current threats.
10) Thomas Schelling employed game theory to demonstrate that the probability of conflict between adversaries depends on their perceptions of each other's intentions and their fear of being attacked first.
d]) ANON-ID-CCA secure if all t-time ANON-ID-CCA adversaries making at most [q.
Maintaining readiness would prove incredibly valuable as the Cold War ended and new threats and adversaries emerged.
There is considerable disagreement on whether providing confidential information to prosecutors in exchange for leniency amounts to a waiver of the privilege and thus entitles private adversaries to the same information.
George argues that it is necessary when dealing with irrational adversaries to distinguish between abstract concepts and real-time strategy.
Knight, speaking at a missile defense conference, said that the United States is seen by its adversaries as the source of trouble in the world.
Terrorist groups and other adversaries use covert techniques to carry out computer network attacks, espionage, data collection, network mapping and reconnaissance, and data theft.
Each scenario should clearly identify the elements being evaluated and the characteristics of the adversaries being used in that drill.