NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 51 to 60 of 221 records.
Resort by: Date / Title


51. A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation
Topic: Cybersecurity
Published: 11/5/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper we propose and discuss a game-theoretic framework for (a) evaluating security vulnerability, (b) quantifying the corresponding Pareto optimal vulnerability/cost tradeo®, and (c) identifying the optimal operating point on this Pareto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912263

52. Conducting Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs
Series: ITL Bulletin
Topic: Cybersecurity
Published: 10/25/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the D ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912722

53. Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
Topic: Cybersecurity
Published: 10/11/2012
Authors: Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing app ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911327

54. Revised Guide Helps Organizations Handle Security-Related Incidents
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 800-61 Revision 2, Computer Security Incident Handling Guide. This publication assists organizations in establishing computer security incident response capabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912387

55. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/13/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

56. Mobile Application Device Power Usage Measurements
Topic: Cybersecurity
Published: 7/31/2012
Authors: Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey Mark Voas
Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911099

57. What Continuous Monitoring Really Means
Topic: Cybersecurity
Published: 7/24/2012
Author: Ronald S Ross
Abstract: [Print Title: "Establishing a Secure Framework"] Recently, NIST completed a fundamental transformation of the traditional certification and accreditation process into a comprehensive, near real-time, security life cycle process as part of a Risk Man ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911474

58. NIST Test Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7870
Topic: Cybersecurity
Published: 7/12/2012
Author: David A Cooper
Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911544

59. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342

60. Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 6/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911668



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series