NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 41 to 50 of 229 records.
Resort by: Date / Title


41. Guide to Industrial Control Systems (ICS) Security
Series: Special Publication (NIST SP)
Report Number: 800-82r1
Topic: Cybersecurity
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913905

42. ITL Publishes Security and Privacy Controls for Federal Agencies
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/1/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative Inte ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913884

43. Logic Minimization Techniques with Applications to Cryptology
Topic: Cybersecurity
Published: 4/1/2013
Authors: Joan Boyar, Philip Matthews, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit { as measured by the number of non-linear gates it contains { is reduced. The second step reduc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908384

44. NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/21/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913588

45. Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 ‹ 24, 2012
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7916
Topic: Cybersecurity
Published: 2/15/2013
Author: Tanya L Brewer
Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop,April 23 ‹ 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive veh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911946

46. Report on the Static Analysis Tool Exposition (SATE) IV
Series: Special Publication (NIST SP)
Report Number: 500-297
Topic: Cybersecurity
Published: 2/4/2013
Authors: Vadim Okun, Aurelien Michel Dominique Delaitre, Paul E Black
Abstract: The NIST SAMATE project conducted the fourth Static Analysis Tool Exposition (SATE IV) to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912378

47. Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/29/2013
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913241

48. Using Attack Graphs in Forensic Examinations
Topic: Cybersecurity
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

49. Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information
Series: ITL Bulletin
Topic: Cybersecurity
Published: 12/19/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913043

50. Introducing the Federal Cybersecurity R&D Strategic Plan
Topic: Cybersecurity
Published: 12/14/2012
Authors: Douglas Maughan, William D Newhouse, Tomas Vagoun
Abstract: In December 2011, the White House Office of Science and Technology Policy (OSTP) released the Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program - a framework for a set of coordinated Federal strateg ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912193



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series