NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 21 to 30 of 240 records.
Resort by: Date / Title


21. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Topic: Cybersecurity
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50745

22. Assessing the Effectiveness of Security Controls in Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans. The r ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906601

23. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

24. Avoiding Catastrophes in Cyberspace through Smarter Testing: How to prevent Heartbleed-like disasters using readily available testing technologies
Topic: Cybersecurity
Published: 10/16/2014
Authors: Apostol T Vassilev, Christopher Celi
Abstract: The recently discovered Heartbleed bug in OpenSSL‰s implementation of Internet security protocols and the aftermath from dealing with its consequences highlights a critical problem in the software industry. Software is routinely, inadequately tested ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916849

25. BIOS Protection Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-147
Topic: Cybersecurity
Published: 4/29/2011
Authors: David A Cooper, William T Polk, Andrew Richard Regenscheid, Murugiah P Souppaya
Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908423

26. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Author: Susanne M Furman
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909994

27. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911889

28. Building Security into Off-the-Shelf Smartphones
Topic: Cybersecurity
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T. (Tom) Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909685

29. Can TCP Metastability Explain Cascading Failures and Justify Flow Admission Control in the Internet?
Topic: Cybersecurity
Published: 6/2/2008
Author: Vladimir V Marbukh
Abstract: This paper discusses implications of possible metastability of TCP-type fair bandwidth sharing under random flow arrivals/departures for understanding and defending the Internet against cascading failures.  Cascading failures can be viewed as a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152132

30. Challenging Security Requirements for US Government Cloud Computing Adoption
Topic: Cybersecurity
Published: 11/27/2012
Author: Michaela Iorga
Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was task ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912695



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series