Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Cybersecurity Framework Version 1.1 Manufacturing Profile

Author(s)
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Michael J. Pease, Jeffrey A. Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The "Manufacturing

Reliable, High-Performance Wireless Systems for Factory Automation

Author(s)
Kang B. Lee, Richard Candell, Hans-Peter Bernhard, Dave Cavalcanti, Zhibo Pang, Inaki Val
Wireless has emerged as an enabling technology to improve operational flexibility and efficiency for factory automation. The latest wireless technology

NIST Cloud Computing Forensic Science Challenges

Author(s)
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross Leo, Richard Lee, Nancy Landreville, Anand K. Mishra, Yien Wang, Rodrigo Sardinas
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses

Four Principles of Explainable Artificial Intelligence (Draft)

Author(s)
P J. Phillips, Amanda C. Hahn, Peter C. Fontana, David A. Broniatowski, Mark A. Przybocki
We introduce four principles for explainable artificial intelligence (AI) that comprise the fundamental properties for explainable AI systems. They were

Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection

Author(s)
Michael P. Powell, James J. McCarthy, CheeYee Tang, Keith A. Stouffer, Timothy A. Zimmerman, William C. Barker, Titilayo Ogunyale, Devin M. Wynne
Industrial control systems (ICS) are used in many industries to monitor and control physical processes. As ICS continue to adopt commercially available

IoT Device Cybersecurity Capability Core Baseline

Author(s)
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device

SATE VI Ockham Sound Analysis Criteria

Author(s)
Paul E. Black, Kanwardeep S. Walia
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use heuristics or approximations to examine programs

Survey of Drone Usage in Public Safety Agencies

Author(s)
Hien V. Nguyen, Terese W. Manley, Kamel S. Saidi
The Public Safety Communications Research (PSCR) Division at the National Institute of Standards and Technology (NIST) conducted a survey to explore ways in