NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 11 to 20 of 724 records.
Resort by: Date / Title


11. Cyber-Physical Systems Framework
Topic: Information Technology
Published: 11/2/2015
Author: David A Wollman
Abstract: Two worlds that have operated independently,the digital and physical worlds,are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919500

12. Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
Topic: Information Technology
Published: 10/30/2015
Authors: Anoop Singhal, Xiaoyan Sun, Jun Dai, Peng Liu
Abstract: Enterprise networks are migrating to the public cloud to acquire computing resources for a number of promising benefits in terms of efficiency, expense, and flexibility. Except some public services, the enterpise network islands in cloud are expected ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916236

13. The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program
Topic: Information Technology
Published: 10/29/2015
Authors: Bonnie Jean Dorr, Craig Stuart Greenberg, Peter C Fontana, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L Chang
Abstract: The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919612

14. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987 Rev 1
Topic: Information Technology
Published: 10/27/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce a co ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919292

15. A Sensor-Based Method for Diagnostics of Machine Tool Linear Axes
Topic: Information Technology
Published: 10/24/2015
Authors: Gregory W Vogl, Brian A Weiss, M Alkan Donmez
Abstract: A linear axis is a vital subsystem of machine tools, which are vital systems within many manufacturing operations. When installed and operating within a manufacturing facility, a machine tool needs to stay in good condition for parts production. All ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919026

16. NIST Big Data Interoperability Framework: Volume 1, Definitions
Series: Special Publication (NIST SP)
Report Number: 1500-1
Topic: Information Technology
Published: 10/22/2015
Author: Wo L Chang
Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918927

17. The NIST IAD Data Science Research Program
Topic: Information Technology
Published: 10/19/2015
Authors: Bonnie Jean Dorr, Peter C Fontana, Craig Stuart Greenberg, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J Golden III, Wo L Chang
Abstract: We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918807

18. Poster:A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 10/15/2015
Authors: Anoop Singhal, Changwei Liu, Duminda Wijesekera
Abstract: Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919122

19. Who Touched my Mission: Towards Probabilistic Mission Impact Assessment
Topic: Information Technology
Published: 10/12/2015
Authors: Xiaoyan Sun, Anoop Singhal, Peng Liu
Abstract: Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919037

20. Retrieval and classification methods for textured 3D models: A comparative study
Topic: Information Technology
Published: 8/25/2015
Author: Afzal A Godil
Abstract: This paper presents a comparative study of six methods for the retrieval and classification of tex- tured 3D models, which have been selected as represen- tative of the state of the start and evaluated through 17 runs. To better analyse and control ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917596



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series