NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: date

Displaying records 21 to 30 of 130 records.
Resort by: Date / Title


21. Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems
Topic: Cybersecurity
Published: 12/31/2014
Authors: Keith A Stouffer, Richard Candell
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of the testbed is to measure the performance of ICS when instrumented with cybersecurity countermeasure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917176

22. Release of NIST Special Publication 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: ITL Bulletin
Topic: Cybersecurity
Published: 12/30/2014
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisio ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917746

23. Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: Special Publication (NIST SP)
Report Number: 800-157
Topic: Cybersecurity
Published: 12/19/2014
Authors: Hildegard Ferraiolo, David A Cooper, Salvatore Francomacaro, Andrew Richard Regenscheid, Jason Mohler, Sarbari Gupta, William Edward Burr
Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917541

24. Metrics of Security
Topic: Cybersecurity
Published: 12/15/2014
Authors: Yi Cheng, Julia Deng, Jason Li, Scott DeLoach, Anoop Singhal, Xinming Ou
Abstract: Discussion of challenges and ways of improving Cyber Situational Awareness dominated our previous chapters. However, we have not yet touched on how to quantify any improvement we might achieve. Indeed, to get an accurate assessment of network securit ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917850

25. Static Analysis is not enough: The Role of Architecture and Design in Software Assurance
Topic: Cybersecurity
Published: 12/1/2014
Author: Walter R. (Walt) Houser
Abstract: Static analysis testing of software source code is necessary but not sufficient. Over 40 percent of the Common Weakness Enumeration (CWE) are likely to be introduced in the architecture and design phase of the development life cycle. By their ver ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916027

26. Avoiding Catastrophes in Cyberspace through Smarter Testing: How to prevent Heartbleed-like disasters using readily available testing technologies
Topic: Cybersecurity
Published: 10/16/2014
Authors: Apostol T Vassilev, Christopher Celi
Abstract: The recently discovered Heartbleed bug in OpenSSL‰s implementation of Internet security protocols and the aftermath from dealing with its consequences highlights a critical problem in the software industry. Software is routinely, inadequately tested ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916849

27. A Cybersecurity Testbed for Industrial Control Systems
Topic: Cybersecurity
Published: 10/9/2014
Authors: Richard Candell, Keith A Stouffer, Dhananjay Anand
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915876

28. Optimizing Information Set Decoding Algorithms to Attack Cyclosymetric MDPC Codes
Topic: Cybersecurity
Published: 10/3/2014
Author: Ray A Perlner
Abstract: The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916132

29. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Topic: Cybersecurity
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

30. Guidelines for Smart Grid Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628 Rev 1
Topic: Cybersecurity
Published: 9/25/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related character ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series