NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 931 to 940 of 989 records.
Resort by: Date / Title


931. Using Attack Graphs in Forensic Examinations
Topic: Information Technology
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

932. Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems
Topic: Information Technology
Published: 1/21/2009
Authors: Christopher E Dabrowski, Fern Y Hunt
Abstract: In large-scale grid systems with decentralized control, the interactions of many service providers and consumers will likely lead to emergent global system behaviours that result in unpredictable, often detrimental, outcomes. This possibility argues ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890095

933. Using Model Checking to Generate Tests from Specifications
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6166
Topic: Information Technology
Published: 11/1/1998
Authors: P E Ammann, Paul E Black, William J Majurski
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900848

934. Using Personal Identity Verification (PIV) Credentials in Physical Access Control Systems (PACS)
Series: ITL Bulletin
Topic: Information Technology
Published: 2/26/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), written by William MacGregor of NIST, Ketan Mehta of Mehta, Inc., a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901953

935. Using S-Check ML Version 3 (supersedes NISTIR 5789)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 578
Topic: Information Technology
Published: 2/1/1999
Authors: Robert D Snelick, N Drouin, J Antonishek, Michael D Indovina, M M Courson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900781

936. Using Security Configuration Checklists and the National Checklist Program
Series: ITL Bulletin
Topic: Information Technology
Published: 5/25/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products,Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Te ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908647

937. Using Self-Organizing Recognition as a Mechanism for Rejecting Segmentation Errors
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4938
Topic: Information Technology
Published: 10/1/1992
Authors: R A Wilkinson, Michael D Garris, Charles L. Wilson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900657

938. Using Simulation To Assess The Effectiveness of Pallet Stacking Methods
Topic: Information Technology
Published: 11/19/2010
Authors: Stephen B. Balakirsky, Frederick M Proctor, Thomas Rollin Kramer, Pushkar Kolhe, Henrik I. Christensen
Abstract: Stacking objects onto pallets is the most widely used method of bulk shipping, accounting for over 60% of the volume of goods shipped worldwide. Due in part to the wide variation in size, shape and weight of objects to be palletized, successful stack ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906569

939. Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5139
Topic: Information Technology
Published: 3/1/1993
Authors: Robert D Snelick, J Ja' ja', Raghu N Kacker, Gordon E Lyon
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900679

940. Using clock accuracy to guide model synthesis in distributed systems: An application in power grid control
Topic: Information Technology
Published: 9/27/2010
Authors: Dhananjay Anand, Jeffrey Fletcher, YaShian Li-Baboud, Julien Marc Amelot, James Moyne
Abstract: Practical implementations in distributed model based control face a fundamental trade-off between model complexity and the number of modeled nodes. For linear systems, higher order models better capture the behavior of the system at higher frequencie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906257



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series