Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 21 to 30 of 735 records.
Resort by: Date / Title

21. Cyber-Physical Systems Framework
Topic: Information Technology
Published: 11/2/2015
Author: David A Wollman
Abstract: Two worlds that have operated independently,the digital and physical worlds,are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and ...

22. Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
Topic: Information Technology
Published: 10/30/2015
Authors: Anoop Singhal, Xiaoyan Sun, Jun Dai, Peng Liu
Abstract: Enterprise networks are migrating to the public cloud to acquire computing resources for a number of promising benefits in terms of efficiency, expense, and flexibility. Except some public services, the enterpise network islands in cloud are expected ...

23. The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program
Topic: Information Technology
Published: 10/29/2015
Authors: Bonnie Jean Dorr, Craig Stuart Greenberg, Peter C Fontana, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L Chang
Abstract: The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish ...

24. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987 Rev 1
Topic: Information Technology
Published: 10/27/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce a co ...

25. A Sensor-Based Method for Diagnostics of Machine Tool Linear Axes
Topic: Information Technology
Published: 10/24/2015
Authors: Gregory W Vogl, Brian A Weiss, M Alkan Donmez
Abstract: A linear axis is a vital subsystem of machine tools, which are vital systems within many manufacturing operations. When installed and operating within a manufacturing facility, a machine tool needs to stay in good condition for parts production. All ...

26. NIST Big Data Interoperability Framework: Volume 1, Definitions
Series: Special Publication (NIST SP)
Report Number: 1500-1
Topic: Information Technology
Published: 10/22/2015
Author: Wo L Chang
Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data ...

27. The NIST IAD Data Science Research Program
Topic: Information Technology
Published: 10/19/2015
Authors: Bonnie Jean Dorr, Peter C Fontana, Craig Stuart Greenberg, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J Golden III, Wo L Chang
Abstract: We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of ...

28. Poster:A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 10/15/2015
Authors: Anoop Singhal, Changwei Liu, Duminda Wijesekera
Abstract: Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack s ...

29. Who Touched my Mission: Towards Probabilistic Mission Impact Assessment
Topic: Information Technology
Published: 10/12/2015
Authors: Xiaoyan Sun, Anoop Singhal, Peng Liu
Abstract: Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact ...

30. Retrieval and classification methods for textured 3D models: A comparative study
Topic: Information Technology
Published: 8/25/2015
Author: Afzal A Godil
Abstract: This paper presents a comparative study of six methods for the retrieval and classification of tex- tured 3D models, which have been selected as represen- tative of the state of the start and evaluated through 17 runs. To better analyse and control ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series