NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 1 to 10 of 961 records.
Resort by: Date / Title


1. NIST and Computer Security
Topic: Information Technology
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: This article describes NIST's contributions in the field of Computer Security.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

2. An Empirical Comparison of Combinatorial and Random Testing
Topic: Information Technology
Published: 4/1/2014
Authors: Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N Kacker, David R Kuhn
Abstract: Abstract- Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915439

3. Estimating Fault Detection Effectiveness
Topic: Information Technology
Published: 4/1/2014
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This poster gives an overview of methods for estimating fault detection effectiveness of a test set based on combinatorial coverage for a class of software.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915440

4. Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Topic: Information Technology
Published: 4/1/2014
Authors: Jon Hagar, David R Kuhn, Raghu N Kacker, Thomas Wissink
Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT wou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915302

5. Exploring the Methodology and Utility of Standardized Latent Fingerprint Matcher Scoring
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7992
Topic: Information Technology
Published: 3/17/2014
Authors: Vladimir N Dvornychenko, George W Quinn
Abstract: Explores methods for defining a standardized matcher score for Automated Fingerprint Identification Systems (AFIS). A standardized score facilitates evaluating candidate lists from AFIS, and decreases the burden on the human expert. Such scoring will ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915196

6. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911836

7. Methods for improving visibility measurement standards of powered industrial vehicles
Topic: Information Technology
Published: 2/28/2014
Authors: Roger V Bostelman, Jochen Teizer, Soumitry J. Ray, Mike Agronin, Dominic Albanese
Abstract: Poor visibility of powered industrial vehicles, such as forklifts, used in industry is often the cause of accidents that include pedestrians. Current standards allow up to 20% non-visible regions for forklifts where measurement of these regions is p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912877

8. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Information Technology
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

9. Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations
Topic: Information Technology
Published: 2/19/2014
Authors: Kelley L Dempsey, Gregory Allen Witte, Doug Rike
Abstract: The white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915325

10. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Information Technology
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series