Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 31 to 40 of 141 records.
Resort by: Date / Title

31. Establishing a Computer Security Incident Response Capability (CSIRC)
Series: Special Publication (NIST SP)
Report Number: 800-3
Topic: Cybersecurity
Published: 11/1/1991
Author: John P Wack
Abstract: [Superseded by SP 800-61 (January 2004): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151291] Government agencies and other organizations have begun to augment their computer security efforts because of increased threats to computer s ...

32. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Cybersecurity
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...

33. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...

34. Fuzz Testing for Software Assurance
Topic: Cybersecurity
Published: 3/1/2015
Authors: Vadim Okun, Elizabeth Nee nee Fong
Abstract: Fuzz Testing, or fuzzing, is a software testing technique that involves providing invalid, unexpected, or random test inputs to the software system under test. The system is then monitored for crashes and other undesirable behavior. Fuzz testing can ...

35. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...

36. Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist
Series: Special Publication (NIST SP)
Report Number: 800-69
Topic: Cybersecurity
Published: 9/29/2006
Authors: Karen Kent Scarfone, Murugiah P Souppaya, John Connor
Abstract: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to as ...

37. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...

38. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 2/22/2010
Authors: Ronald S Ross, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010, w/updates through 6/5/2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094] The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to fe ...

39. Guide for the Security Certification and Accreditation of Federal Information Systems
Series: Special Publication (NIST SP)
Report Number: 800-37
Topic: Cybersecurity
Published: 5/20/2004
Authors: Ronald S Ross, Marianne M. Swanson, G Stoneburner, Stuart W. Katzke, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904985] The purpose of this publication is to provide guidelines for the security certification and accreditation of information systems sup ...

40. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121
Topic: Cybersecurity
Published: 9/30/2008
Authors: Karen Ann Scarfone, John Padgette
Abstract: [Superseded by SP 800-121 Rev. 1 (June 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911133] Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wirel ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series