Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 1 to 10 of 141 records.
Resort by: Date / Title

1. Integrating Top-down and Bottom-up Cybersecurity Guidance Using XML
Topic: Cybersecurity
Published: 8/11/2016
Author: Joshua Lubell

2. Integrating Top-down and Bottom-up Cybersecurity Guidance using XML
Topic: Cybersecurity
Published: 8/1/2016
Author: Joshua Lubell
Abstract: This paper describes a markup-based approach for synthesizing disparate information sources, and then discusses a software implementation of the approach. The implementation, developed using XForms and Extensible Stylesheet Language Transformatio ...

3. Usability and Security Considerations for Public Safety Mobile Authentication
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8080
Topic: Cybersecurity
Published: 7/27/2016
Authors: Yee-Yin Choong, Joshua M Franklin, Kristen Greene
Abstract: There is a need for cybersecurity capabilities and features to protect the Nationwide Public Safety Broadband Network (NPSBN). However, cybersecurity requirements should not compromise the ability of first responders to complete their missions. In ad ...

4. Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks
Topic: Cybersecurity
Published: 7/20/2016
Authors: Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: Diversity as a security mechanism has received revived interest recently due to its potential for improving the resilience of software and networks against unknown attacks. Recent work show diversity can be modeled and quantified as a security metric ...

5. Demystifiying the Internet of Things
Topic: Cybersecurity
Published: 6/27/2016
Author: Jeffrey Mark Voas
Abstract: This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

6. Identifying And Categorizing Data Types for Public Safety Mobile Applications Workshop Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8135
Topic: Cybersecurity
Published: 6/1/2016
Author: Michael A Ogata
Abstract: The Association of Public-Safety Communications (APCO), in cooperation with FirstNet and the Department of Commerce held a half-day workshop on June 2, 2015 titled "Identifying and Categorizing Data Types for Public Safety Mobile Applications." T ...

7. inf-TESLA: Multicast Delayed Authentication For Streaming Sensor Data in Electric Power Systems
Topic: Cybersecurity
Published: 6/1/2016
Authors: Sergio Camara, Dhananjay Anand, Victoria Y Pillitteri, Luiz Fernando Rust da Costa Carmo
Abstract: Multicast authentication of synchrophasor data is challenging due to the design requirements of electric power monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we prop ...

8. Baseline Tailor: Software-aided Security Control Selection
Topic: Cybersecurity
Published: 5/27/2016
Author: Joshua Lubell

9. Baseline Tailor User Guide
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8130
Topic: Cybersecurity
Published: 4/25/2016
Author: Joshua Lubell
Abstract: This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the National Institute of Standards and Technology Special Publication 800-53 Revision 4 secu ...

10. PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85A-4
Topic: Cybersecurity
Published: 4/13/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
Abstract: NIST Special Publication (SP) 800-73 contains the technical specifications to interface with the smart card to retrieve and use the Personal Identity Verification (PIV) identity credentials. This document, SP 800-85A, contains the test assertions and ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series