NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: date

Displaying records 31 to 40 of 124 records.
Resort by: Date / Title

31. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...

32. SATE V Background
Topic: Cybersecurity
Published: 3/14/2014
Author: Vadim Okun

33. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black

34. SATE V Synthetic - Method and Results
Topic: Cybersecurity
Published: 3/14/2014
Author: Aurelien Michel Dominique Delaitre

35. Cybersecurity User's Guide to the Guidelines for Smart Grid Cybersecurity (NISTIR 7628 Vol. 1 2010)
Topic: Cybersecurity
Published: 2/28/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: While the NISTIR 7628 document covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an organization's cybersecurity risk management practices. The User's Gui ...

36. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...

37. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Topic: Cybersecurity
Published: 1/31/2014
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, resear ...

38. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...

39. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Cybersecurity
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...

40. WS-Biometric Devices
Topic: Cybersecurity
Published: 12/17/2013
Authors: Kevin C Mangold, Ross J Micheals

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series