Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 81 - 90 of 1074142 documents for prestamos sin checar buro en mty Visitar el sitio WWWLOAN24HXYZ prestamos sin buro de credito en qro prestamos personales en efectivo en mexicali prestamos de dinero en infonavit prestamos xalapa via nomina prestamos personales rapidos sin aval mexico prestamos inmediatos en efectivo df sin aval prestamos sin aval ni buro de credito cuernavaca prestamos sin aval en gdl prestamos del issste de hoja verde prestamos bancarios banco azteca prestamos compartamos banco xalapa prestamos banamex prestamos personales facil y rapido jalisco
Relevance
Date
  1. ARM input to Commission

    https://www.nist.gov/system/files/documents/2016/09/15/arm_rfi_final_letterhead.pdf
    ARM Holdings plc · 110 Fulbourn Road · Cambridge CB1 9NJ · UK Tel:+44 1223 400400 · Fax +44 1223 400410 · Web: www.arm.com Registered in England 2548782 Cybersecurity in IoT: Challenges and emerging technologies Summary IoT will impact many highly diverse sectors and applications. Levels of security will need to be risk based, but there will be underlying common security concerns. A major problem is the fragmented IoT software development ecosystem, with no agreed approach to IoT security. ARM is aiming to address this through its mbed suite of products. Certain applications will need a hardware root of trust (e.g. TrustZone). We support FIDO as a password-less approach to identity authentication. Introduction ARM welcomes this opportunity to respond to the RFI on...
  2. TDSC-0026-0204-1 1..12

    https://www.nist.gov/system/files/documents/itl/antd/Monitoring-the-Macroscopic-Effect-of-DDoS-Flooding-Attacks.pdf
    Monitoring the Macroscopic Effect of DDoS Flooding Attacks Jian Yuan and Kevin Mills, Senior Member, IEEE Abstract—Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information. Unfortunately, continuously monitoring network-wide traffic for suspicious activities presents difficult challenges because attacks may arise anywhere at any time and because attackers constantly modify attack dynamics to evade detection. In this paper, we propose a method for early attack detection. Using only a few observation points, our proposed method can monitor the macroscopic effect of DDoS flooding attacks. We show that such macroscopic-level monitoring might be used to capture shifts in spatial-tem...
  3. https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/04_hayashi.pdf

    https://csrc.nist.gov/CSRC/media/Events/Non-Invasive-Attack-Testing-Workshop/documents/04_Hayashi.pdf
    Non-invasive Trigger-free Fault Injection Method Based on Intentional Electromagnetic Interference Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone Tohoku University, Aramaki Aza Aoba 6-6-5, Sendai 980-8579, Japan Abstract—This paper presents a new type of fault injec- tion method based on intentional electromagnetic interference (IEMI), which causes information leakage from cryptographic devices without disrupting their operations or damaging their physical structures. The basic principle is to transmit a sinusoidal EM wave via a power/communication cable or an antenna. The IEMI-based fault injection method is performed at a distance from the target module through many filtering components, such as a voltage regulator, without leaving any hard evidence of the ...
  4. Code of Ethical Conduct

    https://www.nist.gov/system/files/documents/2017/01/31/code_of_ethical_conduct_for_link_in_elearning_module.pdf
    Rev. 8/30/2017 Code of Ethical Conduct Members of the Board of Examiners (members) for the Malcolm Baldrige National Quality Award pledge to uphold their professional principles in the fulfillment of their responsibilities as defined in the administration of Public Law 100-107, the Malcolm Baldrige National Quality Improvement Act of 1987. The Board of Examiners Code of Ethical Conduct establishes accountability for these principles. Four principles are the foundation of the Code of Ethical Conduct. These principles are intended to protect the interests of all key stakeholders, including applicants, examiners, judges, and the program, creating a safe and empowering environment for all to engage, share, learn, and improve. Known violations should be reported as soon as practical to the BPEP Director, ...
  5. Aggregate LTE: Characterizing User Equipment Emissions Phase 1 Test and Metrology Plan: Laboratory measurements

    https://www.nist.gov/system/files/documents/2017/09/13/public_brief_13sept2017_v6.pdf
    Dr. Sheryl Genco Acting NASCTN Program Manager Aggregate LTE: Characterizing User Equipment Emissions Welcome 13 September 2017 National Advanced Spectrum and Communications Test Network (NASCTN) • Established by NIST, NTIA, and DoD in 2015 • Mission: provide robust test processes and validated measurement data necessary to ▫ Develop, evaluate, and deploy spectrum sharing technologies ▫ Inform spectrum policy and regulations What is NASCTN? 2 ▫Test plan development ▫Stakeholder outreach ▫ Identify and facilitate access to appropriate test facilities ▫Test execution ▫Deliver detailed methods and results Transparency, validity, and reproducibility ▫Protect controlled information NASCTN Core Functions 3 Complete (see https://www.nist.gov/ctl/nasctn/projects for more inf...
  6. https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-final.pdf

    https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-final.pdf
    SECURING PROPERTY MANAGEMENT SYSTEMS Cybersecurity for the Hospitality Sector William Newhouse National Cybersecurity Center of Excellence National Institute of Standards and Technology Michael Ekstrom Jeff Finke Sarah Weeks The MITRE Corporation September 13, 2017 hospitality-nccoe@nist.gov This revision incorporates comments from the public. P R O JEC T D ESC R IP TIO N Project Description: Securing Property Management Systems 1 The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity challenges. Through this co...
  7. toc-final-doc.PDF

    https://csrc.nist.gov/CSRC/media/Publications/conference-paper/2000/10/19/proceedings-of-the-23rd-nissc-2000/documents/toc.pdf
    23rd National Information Systems Security Conference Conference Committee ..........................................................................................................................i Table of Contents..................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection ..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University Slides: File Size: 2 M (may take a while to open)................Zipped file 558 K Multiple Self-Organ...
  8. Draft NIST SP 800-177 Revision 1, Trustworthy Email

    https://csrc.nist.gov/CSRC/media/Publications/sp/800-177/rev-1/draft/documents/sp800-177r1-draft.pdf
    DRAFT NIST Special Publication 800-177 1 Revision 1 2 Trustworthy Email 3 4 5 Ramaswamy Chandramouli 6 Simson Garfinkel 7 Stephen Nightingale 8 Scott Rose 9 10 11 12 13 14 15 16 17 18 C O M P U T E R S E C U R I T Y 19 20 21 DRAFT NIST Special Publication 800-177 22 Revision 1 23 Trustworthy Email 24 25 Scott Rose 26 Stephen Nightingale 27 Information Technology Laboratory 28 Advanced Network Technology Division 29 30 Simson L. Garfinkel 31 US Census Bureau 32 33 Ramaswamy Chandramouli 34 Information Technology Laboratory 35 Computer Security Division 36 37 38 39 40 41 42 43 September 2017 44 45 46 47 48 U.S. Department of Commerce 49 Wilbur L. Ross, Jr., Secretary 50 51 Nationa...
  9. https://www.nist.gov/system/files/documents/2018/09/12/solicitation_1333nd18qnb640605_power_amplifiers.pdf

    https://www.nist.gov/system/files/documents/2018/09/12/solicitation_1333nd18qnb640605_power_amplifiers.pdf
    RFQ IFB RFP WOMEN-OWNED SMALL BUSINESS (WOSB) ELIGIBLE UNDER THE WOMEN-OWNED SOLICITATION/CONTRACT/ORDER FOR COMMERCIAL ITEMS OFFEROR TO COMPLETE BLOCKS 12, 17, 23, 24, & 30 1. REQUISITION NUMBER PAGE OF 2. CONTRACT NO. 3. AWARD/EFFECTIVE DATE 4. ORDER NUMBER 5. SOLICITATION NUMBER 6. SOLICITATION ISSUE DATE 7. FOR SOLICITATION INFORMATION CALL: a. NAME b. TELEPHONE NUMBER (No collect calls) 8. OFFER DUE DATE/ LOCAL TIME 9. ISSUED BY 13b. RATING 14. METHOD OF SOLICITATION CODE 15. DELIVER TO 16. ADMINISTERED BY CODE 18a. PAYMENT WILL BE MADE BY CODEFACILITYCODE CODE TELEPHONE NO. 17b. CHECK IF REMITTANCE IS DIFFERENT AND PUT SUCH ADDRESS IN OFFER 18b. SUBMIT INVOICES TO ADDRESS SHOWN IN BLOCK 18a UNLESS BLOCK BELOW IS CHECKED ...
  10. NIST

    https://csrc.nist.gov/CSRC/media/Presentations/1040-Ongoing-Authorization-Dempsey/images-media/1040%20Ongoing%20Authorization-Dempsey.pdf
    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Ongoing Authorization Federal Computer Security Management Forum September 10, 2018 Kelley Dempsey Computer Security Division Information Technology Laboratory NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2 Ongoing Authorization in SP 800-37 R2  Monitor Step, Task M-6  The NIST OA guidance from the June 2014 white paper is incorporated into SP 800-37 R2  There are no substantive changes to the OA guidance in SP 800-37 R2  Expanded Authorization guidance, including OA, is provided in SP 800-37 R2, Appendix F  May be applied to:  Authorizations to Operate  Common Control authorizations  Type and Facility authorizations NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Ongoing Authorization  The risk determinations ...
Showing results 81 - 90 of 1074142 documents for prestamos sin checar buro en mty Visitar el sitio WWWLOAN24HXYZ prestamos sin buro de credito en qro prestamos personales en efectivo en mexicali prestamos de dinero en infonavit prestamos xalapa via nomina prestamos personales rapidos sin aval mexico prestamos inmediatos en efectivo df sin aval prestamos sin aval ni buro de credito cuernavaca prestamos sin aval en gdl prestamos del issste de hoja verde prestamos bancarios banco azteca prestamos compartamos banco xalapa prestamos banamex prestamos personales facil y rapido jalisco