NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 841 to 850 of 979 records.
Resort by: Date / Title


841. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7502
Topic: Information Technology
Published: 12/27/2010
Authors: Peter M Mell, Karen Scarfone
Abstract: The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of vulnera ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906165

842. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7864
Topic: Information Technology
Published: 7/10/2012
Authors: Elizabeth LeMay, Karen Ann Scarfone, Peter M Mell
Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910230

843. The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
Series: ITL Bulletin
Topic: Information Technology
Published: 3/25/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902326

844. The Date-Time Vocabulary
Topic: Information Technology
Published: 7/28/2012
Authors: Mark H Linehan, Edward J Barkmeyer, Stan Hendryx
Abstract: The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911074

845. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

846. The Effect of Training Dynamics on Neural Network Performance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5696
Topic: Information Technology
Published: 8/1/1995
Authors: Charles L. Wilson, J L. Blue, O M Omidvar
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900764

847. The Exact Multiplicative Complexity of the Hamming Weight Function
Topic: Information Technology
Published: 9/13/2005
Authors: Rene C Peralta, Joan Boyar
Abstract: We consider the problem of computing the Hamming weight of an n-bit vector using a circuit with gates for addition and multiplication modulo 2 (alternatively, XOR and conjunction gates) only. The number of multiplications necessary and sufficient to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150712

848. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Information Technology
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

849. The First Census Optical Character Recognition Systems Conference
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4912
Topic: Information Technology
Published: 8/1/1992
Authors: R A Wilkinson, Geist, Wilson, Vogl, Hull, Stanley Janet, Patrick J Grother
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900652

850. The First Text REtrieval Conference (TREC-1)
Series: Special Publication (NIST SP)
Report Number: 500-207
Topic: Information Technology
Published: 5/1/1993
Author: Donna K. Harman
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900456



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series