NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 1 to 10 of 229 records.
Resort by: Date / Title


1. A Cybersecurity Testbed for Industrial Control Systems
Topic: Cybersecurity
Published: 10/9/2014
Authors: Richard Candell, Keith A Stouffer, Dhananjay Anand
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915876

2. A Field Study of User Behavior and Perception in Smartcard Authentication
Topic: Cybersecurity
Published: 9/9/2011
Authors: Emile L Morse, Celeste Lyn Paul, Aiping L Zhang, Yee-Yin Choong, Mary Frances Theofanos
Abstract: A field study of 24 participants over 10 weeks explored user behavior and perception in a smartcard authentication system. Ethnographic methods used to collect data included diaries, surveys, interviews, and field observations. We observed a number o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908188

3. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Topic: Cybersecurity
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914228

4. A Framework for Measuring the Vulnerability of Hosts
Topic: Cybersecurity
Published: 6/30/2008
Authors: Karen Ann Scarfone, Timothy Grance
Abstract: This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152092

5. A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation
Topic: Cybersecurity
Published: 11/5/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper we propose and discuss a game-theoretic framework for (a) evaluating security vulnerability, (b) quantifying the corresponding Pareto optimal vulnerability/cost tradeo®, and (c) identifying the optimal operating point on this Pareto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912263

6. A Model Towards Using Evidence from Security Events for Network Attack Analysis
Topic: Cybersecurity
Published: 4/27/2014
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915771

7. A Model of Joint Congestion Control and Routing Through Random Assignment of Paths
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7590
Topic: Cybersecurity
Published: 2/16/2010
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We investigate the trade-off between utility and path diversity in a model of congestion control where there can be multiple routes between two locations in a network The model contains a random route allocation scheme for each source s (user or TCP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902537

8. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Cybersecurity
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914725

9. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

10. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901171



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series