NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 121 to 130 of 236 records.
Resort by: Date / Title


121. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396

122. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

123. Managing the Configuration of Information Systems with a Focus on Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/26/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NI ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909644

124. Metastability of Fair Bandwidth Sharing Under Fluctuating Demand and Necessity of Flow Admission control
Topic: Cybersecurity
Published: 9/17/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions under random flow arrivals/departures is proposed and discussed. Fluctuations in the numbers of flows in progress cause the network instability even under light load. Th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51233

125. Mobile Application Device Power Usage Measurements
Topic: Cybersecurity
Published: 7/31/2012
Authors: Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey Mark Voas
Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911099

126. Mobile-App Addiction: Threat to Security?
Topic: Cybersecurity
Published: 11/1/2011
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907101

127. NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure
Topic: Cybersecurity
Published: 6/2/2014
Author: Victoria Y Pillitteri
Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915855

128. NIST Test Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7870
Topic: Cybersecurity
Published: 7/12/2012
Author: David A Cooper
Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911544

129. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

130. NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/21/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913588



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series