An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
SCAP Composer is a software application from the National Institute of Standards and Technology (NIST) for creating Security Content Automation Protocol (SCAP –
In today's cloud data centers and edge computing, attack surfaces have significantly increased, cyber attacks are industrialized, and most security control
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
Keith A. Stouffer, Joshua Lubell, Michael Pease, Evan K. Wallace
As supply chains become more complex and the origins of products become harder to discern, efforts are emerging that improve traceability of goods by exchanging
Augmented Reality (AR) is an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed
NIST has developed a user-friendly spreadsheet-based software for the analysis of elastic-plastic fracture toughness tests conducted according to ASTM E1820-20b
Organizational security awareness programs may experience a number of challenges, including lack of funding and staff with the appropriate knowledge and skills
Organizational security awareness programs may experience a number of challenges, including lack of resources, difficulty measuring the impact of the program
Prior industry surveys and research studies have revealed that organizational security awareness programs may face a number of challenges, including lack of
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
Shelly Bagchi, Jeremy Marvel, Megan Zimmerman, Murat Aksu, Brian Antonishek
This report details the third annual, full-day workshop exploring the state-of-practice in the metrology necessary for repeatably and independently assessing
Bill Fisher, Murugiah Souppaya, William C. Barker, Karen Scarfone
Ransomware is a type of malicious attack where attackers encrypt an organization's data and demand payment to restore access. In some instances, attackers may
Barbara Guttman, Mary T. Laamanen, Craig Russell, James Darnell, Chris Atha
The National Institute of Standards and Technology (NIST) conducted a black-box study in conjunction with a scientific foundation review documented in NISTIR
Rick Candell, Mohamed Hany, Karl Montgomery, Yongkang Liu, sebti foufou
Wide deployment of wireless communications plays an essential role in the vision of future cyber-physical systems (CPSs), which includes massive transfer of
Albatross (Family Diomedeidae) are long-lived seabirds that inhabit most of the world's oceans coming ashore only to breed. Most of the species are listed as at
The FY 2017 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 24 participating agencies listed in
Automatic, Automated, or Autonomous - Unmanned Ground Vehicles (A-UGVs), as referred to by ASTM International Committee F45, are industrial vehicles that have
New software, in the form of Microsoft Excel 2016 spreadsheets, has been created for the analysis and qualification of Charpy Verification Lots, to be used by
The FY 2020 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 22 participating agencies listed in
Kevin Stine, Stephen Quinn, Nahla Ivy, Matthew Barrett, Greg Witte, Larry Feldman, Robert Gardner
This document supplements NIST Interagency or Internal Report 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM), by providing additional
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for first responders' use during incident response. A
Piotr A. Domanski, Mark O. McLinden, Valeri I. Babushok, Ian Bell, Tara Fortin, Michael Hegetschweiler, Mark A. Kedzierski, Dennis Kim, Lingnan Lin, Gregory T. Linteris, Stephanie L. Outcalt, Richard A. Perkins, Aaron Rowane, Harrison Skye
This project addresses the objectives of the Statement of Need number WPSON-17-20 "No/Low Global Warming Potential Alternatives to Ozone Depleting Refrigerants
This report describes the evolution of four companies and illustrates the various roles that state governments may play in the early stages of a high-tech start
Reinforcement particle clustering significantly influences the mechanical behavior of metal matrix composites. We have employed clustering analysis techniques
Aluminum based Metal Matrix Composites (MMC's) are being considered for many different high volume applications. The most common manufacturing rout for aluminum
Document is the Annual Report on Federal Agency Use of Voluntary Consensus Standards required to be submitted by NIST the office of Management Budget (OMB)