NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 41 to 50 of 998 records.
Resort by: Date / Title


41. Methods for improving visibility measurement standards of powered industrial vehicles
Topic: Information Technology
Published: 2/28/2014
Authors: Roger V Bostelman, Jochen Teizer, Soumitry J. Ray, Mike Agronin, Dominic Albanese
Abstract: Poor visibility of powered industrial vehicles, such as forklifts, used in industry is often the cause of accidents that include pedestrians. Current standards allow up to 20% non-visible regions for forklifts where measurement of these regions is p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912877

42. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Information Technology
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

43. Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations
Topic: Information Technology
Published: 2/19/2014
Authors: Kelley L Dempsey, Gregory Allen Witte, Doug Rike
Abstract: The white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915325

44. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Information Technology
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385

45. Estimation of uncertainty in application profiles
Series: Technical Note (NIST TN)
Report Number: 1826
Topic: Information Technology
Published: 2/3/2014
Author: David W Flater
Abstract: Application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling tools today is sampling-based profiling, where a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914648

46. IT Risks
Topic: Information Technology
Published: 2/3/2014
Authors: Linda Wilbanks, David R Kuhn, Wes Chou
Abstract: Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915277

47. Software Testing - Guest Editor Introduction
Topic: Information Technology
Published: 2/3/2014
Authors: Renee Bryce, David R Kuhn
Abstract: This special issue presents papers that focus on important problems within the Software Testing community.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915353

48. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Topic: Information Technology
Published: 1/31/2014
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, resear ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914235

49. Security and Privacy Controls for Federal Information Systems and Organizations [including updates as of 1/15/2014]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 1/30/2014
Author: Ronald S Ross
Abstract: This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915447

50. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Information Technology
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914725



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series