NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 31 to 40 of 221 records.
Resort by: Date / Title


31. Economic Case Study: The Impact of NSTIC on the Internal Revenue Service
Series: Grant/Contract Reports (NISTGCR)
Report Number: 13-2
Topic: Cybersecurity
Published: 7/9/2013
Author: Gregory C. Tassey
Abstract: The National Strategy for Trusted Identities in Cyberspace (NSTIC) offers a vision of more secure, efficient, and cost-effective authentication through widespread use of robust third-party credentials standardized to a national strategy. If success ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914288

32. Quantifying Network Topology Robustness Under Budget Constraints
Topic: Cybersecurity
Published: 6/24/2013
Authors: Assane Gueye, Aron Lazska
Abstract: To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A netw ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912970

33. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Cybersecurity
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911971

34. Glossary of Key Information Security Terms
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7298rev2
Topic: Cybersecurity
Published: 6/5/2013
Author: Richard L Kissel
Abstract: The National Institute of Standards and Technology (NIST) has received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913810

35. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Cybersecurity
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

36. Guide to Industrial Control Systems (ICS) Security
Report Number: 800-82r1
Topic: Cybersecurity
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913905

37. ITL Publishes Security and Privacy Controls for Federal Agencies
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/1/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative Inte ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913884

38. Logic Minimization Techniques with Applications to Cryptology
Topic: Cybersecurity
Published: 4/1/2013
Authors: Joan Boyar, Philip Matthews, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit { as measured by the number of non-linear gates it contains { is reduced. The second step reduc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908384

39. NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/21/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913588

40. Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 ‹ 24, 2012
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7916
Topic: Cybersecurity
Published: 2/15/2013
Author: Tanya L Brewer
Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop,April 23 ‹ 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive veh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911946



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series