An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mary Bedner, Jacolin Murray, Aaron A. Urbas, William A. MacCrehan, Walter Brent Wilson
The production and demand for hand sanitizers have increased dramatically during the coronavirus disease 2019 (COVID-19) health emergency. To be deemed...
This guide addresses wearing apparel, including children's apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents...
Jim McCarthy, Karen Reczek, Michael Bartock, Ya-Shian Li-Baboud, Suzanne Lightman, Arthur Scholz, Theresa Suloway, Doug Northrip, Joesph Brule
The national and economic security of the United States (US) is dependent upon the reliable functioning of critical infrastructure. Positioning, Navigation and...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
In today's highly connected, inter-dependent world, all organizations rely on others for critical products and services. However, the reality of globalization...
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile...
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST...
Blockchain technology has enabled a new software paradigm for managing digital ownership in partial- or zero-trust environments. It uses tokens to conduct...
Heather Evans, Kristen K. Greene, William M. Healy, Elizabeth Hoffman, Kate Rimmer, Anna V. Sberegaeva, Neil M. Zimmerman
The 2020 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the...
Jeremy Marvel, Roger D. Eastman, Geraldine S. Cheok, Kamel S. Saidi, Tsai H. Hong, Elena R. Messina, Bob Bollinger, Paul Evans, Joyce Guthrie, Eric Hershberger, Carlos Martinez, Karen McNamara, James Wells
The special session on Technology Readiness Levels (TRLs) for Randomized Bin Picking was held during the morning session of the 2012 Performance Metrics for...
Shelly Bagchi, Jeremy Marvel, Megan L. Zimmerman, Murat Aksu, Brian Antonishek
This report details the second annual, full-day workshop exploring the metrology necessary for repeatably and independently assessing the performance of robotic...
Chuck Barber, Carolyn Burdette, Hugh Hayes, Caleb Luvonga, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Lee L. Yu
HAMQAP was launched in collaboration with the NIH Office of Dietary Supplements (ODS) in 2017. HAMQAP was established to enable laboratories to improve the...
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020...
Shelly Bagchi, Murat Aksu, Megan L. Zimmerman, Jeremy Marvel, Brian Antonishek
Verified and validated test methods, being necessary to measure the performance of complex systems, are important tools for driving innovation, benchmarking and...
John M. Butler, Hariharan K. Iyer, Richard A. Press, Melissa Taylor, Peter Vallone, Sheila Willis
The National Institute of Standards and Technology (NIST) is a scientific research agency that works to advance measurement science, standards, and technology...
This paper explores a low-cost method to bridge analog public safety Land mobile radio (LMR) systems into a standards based Long Term Evolution (LTE) MCPTT...
This user guide describes an integrated set of C++ software tools for manipulating XML (eXtensible Markup Language) schemas and XML instance files. The tools...
Robert D. Byers, David A. Waltermire, Christopher A. Turner
The purpose of this document is to leverage the strength of technical knowledge provided by the Common Vulnerabilities and Exposures (CVE) Numbering Authorities...
Simulation and optimization methods are needed to design and operate large-scale, complex systems. Integrating the two presents a number of conceptual and...
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
Access time generally describes the time associated with the establishment of a talk path upon user request to speak and has been identified as a key component...
This is the second of a series of reports on the performance of face recognition algorithms on faces occluded by protective face masks commonly worn to reduce...
Nicole D. Keller, Stephen Quinn, Karen Scarfone, Matthew Smith, Vincent Johnson
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships...
Matthew P. Barrett, Nicole D. Keller, Stephen Quinn, Matthew Smith, Karen Scarfone
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships...
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, users may lack...
Yooyoung Lee, Amy Yates, Haiying Guan, Jonathan G. Fiscus, Daniel Zhou
The interest of forensic techniques capable of detecting many different manipulation types has been growing, and system developments with machine learning...
The FY 2018 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 23 participating agencies listed in...
The FY 2019 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 22 participating agencies listed in...
Xiongnan Jin, Yooyoung Lee, Jonathan G. Fiscus, Haiying Guan, Amy Yates, Andrew Delgado, Daniel F. Zhou
With the development of storage, transmission, editing, and sharing tools, digital forgery images are propagating rapidly. The need for image provenance...
Kevin M. Stine, Stephen D. Quinn, Gregory A. Witte, Robert Gardner
The increasing frequency, creativity, and severity of cybersecurity attacks means that all enterprises should ensure that cybersecurity risk is receiving...
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The "Manufacturing...
Kang B. Lee, Rick Candell, Hans-Peter Bernhard, Dave Cavalcanti, Zhibo Pang, Inaki Val
Wireless has emerged as an enabling technology to improve operational flexibility and efficiency for factory automation. The latest wireless technology...