NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 91 to 100 of 676 records.
Resort by: Date / Title


91. Using Attack Graphs in Forensic Examinations
Topic: Information Technology
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

92. Extended Feature Set Profile Specification
Series: Special Publication (NIST SP)
Report Number: 1134
Topic: Information Technology
Published: 1/14/2013
Authors: Melissa K Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
Abstract: This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are des ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913056

93. AGVs and Forklifts Gaining Sight for Safety
Topic: Information Technology
Published: 1/10/2013
Author: Roger V Bostelman
Abstract: Forklifts and automated guided vehicles are useful tools for the manufacturing industry. With regard to safety of workers (and equipment) near industrial vehicles, there are issues when using either manned or automated powered industrial vehicles in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912983

94. Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information
Series: ITL Bulletin
Topic: Information Technology
Published: 12/19/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913043

95. Evaluating Real-Time Search over Tweets
Topic: Information Technology
Published: 12/10/2012
Authors: Ian M Soboroff, Dean Paul McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Abstract: Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information so ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911362

96. Combined Issue on High Efficiency Video Coding (HEVC) Standard and Research
Topic: Information Technology
Published: 12/3/2012
Author: Hamid Gharavi
Abstract: Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video co ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912909

97. A Credential Reliability and Revocation Model for Federated Identities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7817
Topic: Information Technology
Published: 11/29/2012
Author: Hildegard Ferraiolo
Abstract: A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to fede ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912464

98. Fast Sequential Importance Sampling fo Estimate the Graph Reliability Polynomial
Topic: Information Technology
Published: 11/8/2012
Authors: David G. Harris, Francis Sullivan, Isabel M Beichl
Abstract: The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905927

99. Ave Atque Vale
Topic: Information Technology
Published: 11/1/2012
Author: Isabel M Beichl
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912298

100. A VIRTUAL MACHINE TOOL FOR THE EVALUATION OF STANDARDIZED 5-AXIS PERFORMANCE TESTS
Topic: Information Technology
Published: 10/26/2012
Authors: Ronnie R. Fesperman Jr., Shawn P Moylan, M Alkan Donmez
Abstract: Standards committees are actively working to develop standard test methods for the performance evaluation of 5-axis machining centers through the direct and indirect measurement of simultaneous motions of all five axes [1-2]. However, the compound ef ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911899



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series