NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 1 to 10 of 125 records.
Resort by: Date / Title

1. A Cybersecurity Testbed for Industrial Control Systems
Topic: Cybersecurity
Published: 10/9/2014
Authors: Richard Candell, Keith A Stouffer, Dhananjay Anand
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections i ...

2. A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation
Topic: Cybersecurity
Published: 11/5/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper we propose and discuss a game-theoretic framework for (a) evaluating security vulnerability, (b) quantifying the corresponding Pareto optimal vulnerability/cost tradeo®, and (c) identifying the optimal operating point on this Pareto ...

3. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Cybersecurity
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...

4. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...

5. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...

6. Analysis of Network Segmentation Techniques in Cloud Data Centers
Topic: Cybersecurity
Published: 7/30/2015
Author: Ramaswamy Chandramouli
Abstract: Cloud Data centers are predominantly made up of Virtualized hosts. The networking infrastructure in a cloud (virtualized) data center, therefore, consists of the combination of physical IP network (data center fabric) and the virtual network residing ...

7. Authentication Considerations for Public Safety Mobile Networks
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/14/2015
Authors: Nelson E Hastings, Joshua M Franklin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, written by Nelson Hastings and Joshua Franklin. The publication analyzes approaches to identity management fo ...

8. Avoiding Catastrophes in Cyberspace through Smarter Testing: How to prevent Heartbleed-like disasters using readily available testing technologies
Topic: Cybersecurity
Published: 10/16/2014
Authors: Apostol T Vassilev, Christopher Celi
Abstract: The recently discovered Heartbleed bug in OpenSSL‰s implementation of Internet security protocols and the aftermath from dealing with its consequences highlights a critical problem in the software industry. Software is routinely, inadequately tested ...

9. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Authors: Susanne M Furman, Mary Frances Theofanos, Yee-Yin Choong, Brian C Stanton
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...

10. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series