NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 21 to 30 of 243 records.
Resort by: Date / Title


21. An Overview and Analysis of PDA Forensic Tools
Topic: Cybersecurity
Published: 4/2/2005
Authors: Wayne Jansen, Richard P Ayers
Abstract: Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidenc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150216

22. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Topic: Cybersecurity
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50745

23. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A Rev 4
Topic: Cybersecurity
Published: 12/11/2014
Author: Ronald S Ross
Abstract: This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. The assessment procedures, executed at various phases of the system deve ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917644

24. Assessing the Effectiveness of Security Controls in Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans. The r ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906601

25. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

26. Avoiding Catastrophes in Cyberspace through Smarter Testing: How to prevent Heartbleed-like disasters using readily available testing technologies
Topic: Cybersecurity
Published: 10/16/2014
Authors: Apostol T Vassilev, Christopher Celi
Abstract: The recently discovered Heartbleed bug in OpenSSL‰s implementation of Internet security protocols and the aftermath from dealing with its consequences highlights a critical problem in the software industry. Software is routinely, inadequately tested ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916849

27. BIOS Protection Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-147
Topic: Cybersecurity
Published: 4/29/2011
Authors: David A Cooper, William T Polk, Andrew Richard Regenscheid, Murugiah P Souppaya
Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908423

28. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Author: Susanne M Furman
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909994

29. Bibliography of Selected Computer Security Publications, January 1980 - October 1989
Series: Special Publication (NIST SP)
Report Number: 800-1
Topic: Cybersecurity
Published: 12/1/1990
Authors: Rein Turn, Lawrence E Bassham
Abstract: This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journal ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=100001

30. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911889



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series