Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 21 to 30 of 731 records.
Resort by: Date / Title


21. A Sensor-Based Method for Diagnostics of Machine Tool Linear Axes
Topic: Information Technology
Published: 10/24/2015
Authors: Gregory W Vogl, Brian A Weiss, M Alkan Donmez
Abstract: A linear axis is a vital subsystem of machine tools, which are vital systems within many manufacturing operations. When installed and operating within a manufacturing facility, a machine tool needs to stay in good condition for parts production. All ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919026

22. NIST Big Data Interoperability Framework: Volume 1, Definitions
Series: Special Publication (NIST SP)
Report Number: 1500-1
Topic: Information Technology
Published: 10/22/2015
Author: Wo L Chang
Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918927

23. The NIST IAD Data Science Research Program
Topic: Information Technology
Published: 10/19/2015
Authors: Bonnie Jean Dorr, Peter C Fontana, Craig Stuart Greenberg, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J Golden III, Wo L Chang
Abstract: We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918807

24. Poster:A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 10/15/2015
Authors: Anoop Singhal, Changwei Liu, Duminda Wijesekera
Abstract: Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919122

25. Who Touched my Mission: Towards Probabilistic Mission Impact Assessment
Topic: Information Technology
Published: 10/12/2015
Authors: Xiaoyan Sun, Anoop Singhal, Peng Liu
Abstract: Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919037

26. Retrieval and classification methods for textured 3D models: A comparative study
Topic: Information Technology
Published: 8/25/2015
Author: Afzal A Godil
Abstract: This paper presents a comparative study of six methods for the retrieval and classification of tex- tured 3D models, which have been selected as represen- tative of the state of the start and evaluated through 17 runs. To better analyse and control ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917596

27. gtklogger: A Tool For Systematically Testing Graphical User Interfaces
Series: Technical Note (NIST TN)
Report Number: 1862
Topic: Information Technology
Published: 8/20/2015
Authors: Stephen A Langer, Faical Yannick Palingwende Congo, Andrew Charles edmu Reid, Rhonald Lua, Valerie R. Coffman
Abstract: We describe a scheme for systematically testing the operation of a graphical user interface. The scheme provides a capability for generating event logs, which are recordings of a user session with the interface. These logs can be annotated with ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917368

28. The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
Topic: Information Technology
Published: 8/4/2015
Authors: Cathryn A. Ploehn, Kristen Greene
Abstract: Password management is the ubiquitous struggle of the modern human. Despite usability playing a vital role in authentication, many password policies and requirements focus on security without sufficient consideration of human factors. In fact, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917889

29. Human Generated Passwords - the Impacts of Password Requirements and Presentation Styles
Topic: Information Technology
Published: 8/2/2015
Authors: Paul Y Lee, Yee-Yin Choong
Abstract: The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leav ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917941

30. Improved Security and Mobility Through Updated Interfaces for PIV Cards
Series: ITL Bulletin
Topic: Information Technology
Published: 7/21/2015
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919014



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series