Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 21 - 30 of 2133488 documents for online nebankovní rychlé pujcky ihned Raspenava Navštivte web na WWWLOAN24HXYZ pujcka online ihned bez registru Humpolec půjčky pavel volf sms rychle pujcky na jiny bankovni ucet co je mobiliární exekuce pujcky na složenku online pujcky ihned Vratimov modrá pyramida půjčky bleskova pujcka 500 korun pujčka cetelem nebankovní pujcky online Jaroměřice nad Rokytnou sms pujčky do 3500 online pujcka lazne belohrad sms pujcka online Toužim
Relevance
Date
  1. Mobile Robot Pose Tracking for Performance Analysis

    https://www.nist.gov/publications/mobile-robot-pose-tracking-performance-analysis
    The NIST Construction Metrology and Automation Group (CMAG), in cooperation with the NIST Intelligent Systems Division (ISD), is researching robotic structural
  2. NIST Workshop: Technical Aspects of Botnet Presentation: Anti-Botnet Ecosystem

    https://www.nist.gov/system/files/documents/itl/csd/ota_botnet_ecoystem.pdf
                                                                                                                                                                                Anti-Botnet Ecosystem Collabora6on, Educa6on, Best Prac6ces, Metrics and R&D Shared Responsibility among End-­‐Users, Industry, Public & Private Sector Prevent • Educate against   social engineering   • Pro...
  3. Draft SP 800-163 Revision 1, Vetting the Security of Mobile Applications

    https://csrc.nist.gov/CSRC/media/Publications/sp/800-163/rev-1/error/documents/sp800-163r1-draft.pdf
    Draft NIST Special Publication 800-163 1 Revision 1 2 Vetting the Security of 3 Mobile Applications 4 5 6 7 8 Michael Ogata 9 Josh Franklin 10 Jeffrey Voas 11 Vincent Sritapan 12 Stephen Quirolgico 13 14 15 16 17 18 19 C O M P U T E R S E C U R I T Y 20 21 22 Draft NIST Special Publication 800-163 23 Revision 1 24 Vetting the Security of 25 Mobile Applications 26 27 Michael Ogata 28 Software and Systems Division 29 Information Technology Laboratory 30 31 Josh Franklin 32 Applied Cybersecurity Division 33 Information Technology Laboratory 34 35 Jeffrey Voas 36 Computer Security Division 37 Information Technol...
  4. [Withdrawn] Draft SP 800-163 Revision 1, Vetting the Security of Mobile Applications

    https://csrc.nist.gov/CSRC/media//Publications/sp/800-163/rev-1/draft/documents/sp800-163r1-draft.pdf
    Withdrawn Draft Warning Notice The attached draft document has been withdrawn, and is provided solely for historical purposes. It has been superseded by the document identified below. Withdrawal Date April 19, 2019 Original Release Date July 23, 2018 Superseding Document Status Final Series/Number NIST Special Publication 800-163 Revision 1 Title Vetting the Security of Mobile Applications Publication Date April 2019 DOI https://doi.org/10.6028/NIST.SP.800-163r1 CSRC URL https://csrc.nist.gov/publications/detail/sp/800-163/rev-1/final Additional Information Draft NIST Special Publication 800-163 1 Revision 1 2 Vetting the Security of ...
  5. Reference Material for Forensic SIM Tools

    https://csrc.nist.gov/CSRC/media/Projects/Mobile-Security-and-Forensics/documents/mobile_forensics/Reference%20Mat-final-a.pdf
    REFERENCE MATERIAL FOR ASSESSING FORENSIC SIM TOOLS Paper No. ICCST 2007-74 Wayne A. Jansen Member, IEEE National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 USA Aurelien Delaitre National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 USA Abstract – Subscriber Identity Modules (SIMs) are a fundamental standardized component of most cell phones used worldwide. A SIM can be removed from a phone handset and inserted into another, allowing users to port identity, personal information, and service between devices. All cell phones are expected to incorporate some type of identity module eventually...
  6. Transition Energies of the D-lines in Na-like Ions

    https://www.nist.gov/publications/transition-energies-d-lines-na-ions
    The NIST electron beam ion trap (EBIT) was used to measure the D1 (3s-3p1/2) and D2 (3s-3p3/2) transitions in Na-like ions of xenon, barium, samarium, gadoliniu
Showing results 21 - 30 of 2133488 documents for online nebankovní rychlé pujcky ihned Raspenava Navštivte web na WWWLOAN24HXYZ pujcka online ihned bez registru Humpolec půjčky pavel volf sms rychle pujcky na jiny bankovni ucet co je mobiliární exekuce pujcky na složenku online pujcky ihned Vratimov modrá pyramida půjčky bleskova pujcka 500 korun pujčka cetelem nebankovní pujcky online Jaroměřice nad Rokytnou sms pujčky do 3500 online pujcka lazne belohrad sms pujcka online Toužim