An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
When infections spread, like malware in networks or diseases in society, not all individual cases are known. Networks may lack the latest detection means and...
At its 2021 meeting, the Institute for Operations Research and the Management Sciences held a panel on Testing and Evaluating Industrial AI and Risk Management...
At its 2021 Conference, the Prognostics and Health Management Society held a panel on Qualifying Data and Data Use Assuring Data Capability for Intelligent...
Industry is increasingly using artificial intelligence to aid analysis and decision-making. It is also recognizing the need to evaluate these tools with respect...
In 6G Cognitive Information Theory: A Mailbox Perspective, published in MDPI, October 16, 2021, NIST and international researchers propose a "cognitive" 6G...
On December 8, 2021, the IEEE Standards Association Standards Board approved the IEEE 2302-2021 Standard for Intercloud Interoperability and Federation produced...
NIST released its Special Publication 1900-301, Automated Driving System Safety Measurement Part I: Operating Envelope Specification. It presents a novel...
On December 2, 2021, over 180 experts from around the world participated in the first 5G-Blueprint Forum on Teleoperation, organized by the 5G-Blueprint Project...
On November 16, 2021, IEEE initiated the IEEE P1451.p working group, now identified as IEEE P3388, chaired by NIST's Rick Candell and assisted by NIST's Kang...
Time synchronization of sensor networks is critical to the Internet of Things (IoT). These sensor networks must provide real-time data in monitoring and...
In The 12 Flavors of Cyberphysical Systems in the December 2021 issue of IEEE’s Computer, Pennsylvania State University's Joanna F. DeFranco and University of...
Disclaimer: Any mention of commercial products within NIST web pages is for information only; it does not imply recommendation or endorsement by NIST. The...
In 2020, NIST and the North American Electric Reliability Corporation (NERC) mapped the NIST Cybersecurity Framework to NERC's Critical Infrastructure...
NIST's Cuong Nguyen led the Smart Electric Power Alliance's (SEPA) Interoperability Task Force in its development of the "EV Fleet Managed Charging Use Case."...
In October 2021, NIST published Distributed Energy Resource Security: Potential Guidelines and Research Topics. This NIST Tech Note addresses an effort to...
A recent Propmodo article, Middleware Needs Standardization to Hold Smart Buildings Together, points out that sensor data in smart buildings and smart cities...
NIST researchers and collaborators recently published the paper, A Framework for the Composition of Internet of Things (IoT) and Cyber-Physical Systems (CPS)...
On October 13, 2021, the GCTC Utility SuperCluster conducted a NIST co-sponsored webcast in which a panel of experts addressed the lessons from technology use...
On October 26-27, 2021, the GCTC Secure and Safe Communities SuperCluster held the NIST cosponsored Cybersecurity Symposium for Smart Cities 2021 focused on...
NIST researchers Rick Candell, Karl Montgomery, Mohamed Hany, and Kang Lee are providing technical leadership to the IEEE P3388 standard committee (previously...
NIST announces the release of a new draft cybersecurity white paper – Planning for a Zero Trust Architecture: A Starting Guide for Administrators, which...
Whether it’s a new set of solar panels glistening on a neighbor’s roof or a freshly installed smart thermostat at home, burgeoning renewable and smart...
NIST announces the final publication of Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a...
Zero trust refers to an evolving set of network security paradigms that narrows defenses from wide network perimeters to individual resources. Its focus on...
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in denial of...