NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 41 to 50 of 122 records.
Resort by: Date / Title


41. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Cybersecurity
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911971

42. VULCAN: Vulnerability Assessment Framework for Cloud Computing
Topic: Cybersecurity
Published: 6/20/2013
Authors: Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal
Abstract: Assessing security of software services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform and the software services. In many systems, the platform or the infrastructure on which the software will actual ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913852

43. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Cybersecurity
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

44. Guide to Industrial Control Systems (ICS) Security
Series: Special Publication (NIST SP)
Report Number: 800-82 Rev 1
Topic: Cybersecurity
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: [Superseded by NIST SP 800-82 Rev. 2 (May 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918368] This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisitio ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913905

45. Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 ‹ 24, 2012
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7916
Topic: Cybersecurity
Published: 2/15/2013
Author: Tanya L Brewer
Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop,April 23 ‹ 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive veh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911946

46. Report on the Static Analysis Tool Exposition (SATE) IV
Series: Special Publication (NIST SP)
Report Number: 500-297
Topic: Cybersecurity
Published: 2/4/2013
Authors: Vadim Okun, Aurelien Michel Dominique Delaitre, Paul E Black
Abstract: The NIST SAMATE project conducted the fourth Static Analysis Tool Exposition (SATE IV) to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912378

47. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911889

48. Challenging Security Requirements for US Government Cloud Computing Adoption
Topic: Cybersecurity
Published: 11/27/2012
Author: Michaela Iorga
Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was task ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912695

49. A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation
Topic: Cybersecurity
Published: 11/5/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper we propose and discuss a game-theoretic framework for (a) evaluating security vulnerability, (b) quantifying the corresponding Pareto optimal vulnerability/cost tradeo®, and (c) identifying the optimal operating point on this Pareto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912263

50. Mobile Application Device Power Usage Measurements
Topic: Cybersecurity
Published: 7/31/2012
Authors: Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey Mark Voas
Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911099



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series