NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 11 to 20 of 252 records.
Resort by: Date / Title

11. A depth-16 circuit for the AES S-box
Topic: Cybersecurity
Published: 12/1/2011
Authors: Joan Boyar, Rene C Peralta
Abstract: New techniques for reducing the depth of circuits for cryptographic applications are described and applied to the AES S-box. These techniques also keep the number of gates quite small. The result, when applied to the AES S-box, is a circuit with de ...

12. Access Control Policy Combinations for the Grid Using the Policy Machine
Topic: Cybersecurity
Published: 5/14/2007
Authors: Chung Tong Hu, David F Ferraiolo, Karen Ann Scarfone
Abstract: Many researchers have tackled the architecture and requirements aspects of grid security, concentrating on the authentication or authorization mediation instead of authorization techniques, especially the topic of policy combination. Policy combinati ...

13. Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications
Topic: Cybersecurity
Published: 4/16/2012
Authors: Dong H. Chang, Moti Yung
Abstract: In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify ...

14. Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/24/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-126 Rev. 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. This publication was written by David Waltermire an ...

15. Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
Topic: Cybersecurity
Published: 10/11/2012
Authors: Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing app ...

16. An Attack Graph Based Probabilistic Security Metric
Topic: Cybersecurity
Published: 7/16/2008
Authors: Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
Abstract: To protect critical resources in today's networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now becomes feasible due to a model of causal relationships betwee ...

17. An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
Topic: Cybersecurity
Published: 7/31/2013
Authors: M. Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang
Abstract: Computer systems are vulnerable to both known and zero-day attacks. Although known attack patterns can be easily modeled, thus enabling the definition of suitable hardening strategies, handling zero-day vulnerabilities is inherently difficult due to ...

18. An IEEE 1588 Performance Testing Dashboard for Power Industry Requirements
Topic: Cybersecurity
Published: 9/12/2011
Authors: Julien Marc Amelot, YaShian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
Abstract: The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry‰s accuracy, reliabili ...

19. An Inconvenient Truth About Tunneled Authentications
Topic: Cybersecurity
Published: 10/10/2010
Authors: Katrin Hoeper, Lidong Chen
Abstract: In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks on such tunneled authentications have been discovered early on and cryptographic bindings ...

20. An Integrated Detection System Against False Data Injection Attacks in the Smart Grid
Topic: Cybersecurity
Published: 3/4/2014
Authors: Wei Yu, David Wesley Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T Golmie
Abstract: The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especiall ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series