NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 41 to 50 of 221 records.
Resort by: Date / Title


41. Report on the Static Analysis Tool Exposition (SATE) IV
Series: Special Publication (NIST SP)
Report Number: 500-297
Topic: Cybersecurity
Published: 2/4/2013
Authors: Vadim Okun, Aurelien Michel Dominique Delaitre, Paul E Black
Abstract: The NIST SAMATE project conducted the fourth Static Analysis Tool Exposition (SATE IV) to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912378

42. Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/29/2013
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913241

43. Using Attack Graphs in Forensic Examinations
Topic: Cybersecurity
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

44. Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information
Series: ITL Bulletin
Topic: Cybersecurity
Published: 12/19/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913043

45. Introducing the Federal Cybersecurity R&D Strategic Plan
Topic: Cybersecurity
Published: 12/14/2012
Authors: Douglas Maughan, William D Newhouse, Tomas Vagoun
Abstract: In December 2011, the White House Office of Science and Technology Policy (OSTP) released the Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program - a framework for a set of coordinated Federal strateg ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912193

46. Securing America‰s Digital Infrastructure Through Education
Topic: Cybersecurity
Published: 12/14/2012
Author: William D Newhouse
Abstract: This article provides an overview of the establishment of the National Initiative for Cybersecurity Education (NICE), its government structure, and it goals. Parallels are drawn between the strategic R&D thrust, Developing Scientific Foundations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912106

47. Protecting Wireless Local Area Networks
Topic: Cybersecurity
Published: 12/3/2012
Authors: Shirley M. Radack, David R Kuhn
Abstract: This article summarizes the information that was presented in the February 2012 Information Technology Laboratory (ITL) bulletin, Guidelines for Securing Wireless Local Area Networks (WLANs). The bulletin, which was noted by WERB in February 2012, wa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912594

48. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911889

49. Challenging Security Requirements for US Government Cloud Computing Adoption
Topic: Cybersecurity
Published: 11/27/2012
Author: Michaela Iorga
Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was task ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912695

50. Practices for Managing Supply Chain Risks to Protect Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NISTIR 7622, Notional Supply Chain Risk Management Practices for Federal Information Systems. This publication provides federal departments and agencies with a notional set of repeatable an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912849



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series