An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Dictionary of Algorithms and Data Structures (DADS) is a publicly accessible dictionary of generally useful algorithms, data structures, algorithmic...
Internet of Things (IoT) is the product of the worlds of information technology (IT) and operational technology (OT)converging. IoT combines the ability to...
Katrice A. Lippa, Mary Bedner, Susan Tai, Carolyn Q. Burdette
The National Institute of Standards and Technology (NIST) established a Vitamin D Metabolites Quality Assurance Program (VitDQAP) in collaboration with the...
Shahram Orandi, John M. Libert, Bruce Bandini, Kenneth Ko, John D. Grantham, Craig I. Watson
This study set out to examine the operational impact of introducing contactless fingerprint imagery to a modern fingerprint matching system that was designed...
Shanee T. Dawkins, Kristen Greene, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network, the public safety community is in the process of supplementing the use of land mobile radios...
Celia Paulsen, Jon M. Boyens, Jeffrey Ng, Kris Winkler, James Gimbi
As awareness of cybersecurity supply chain risks grows among federal agencies, there is a greater need for tools that evaluate the impacts of a supply chain...
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross Leo, Richard Lee, Nancy Landreville, Anand K. Mishra, Yien Wang, Rodrigo Sardinas
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses...
P Phillips, Carina Hahn, Peter Fontana, David A. Broniatowski, Mark A. Przybocki
We introduce four principles for explainable artificial intelligence (AI) that comprise the fundamental properties for explainable AI systems. They were...
This is the first of a series of reports on the performance of face recognition algorithms on faces occluded by masks, run under the Ongoing Face Recognition...
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition...
Michael P. Powell, James J. McCarthy, CheeYee Tang, Keith Stouffer, Timothy Zimmerman, William C. Barker, Titilayo Ogunyale, Devin M. Wynne
Industrial control systems (ICS) are used in many industries to monitor and control physical processes. As ICS continue to adopt commercially available...
Luis Brandao, Michael S. Davidson, Apostol T. Vassilev
This document constitutes a preparation toward devising criteria for the standardization of threshold schemes for cryptographic primitives by the National...
Timothy A. Sprock, George Thiers, Leon F. McGinnis, Conrad E. Bock
System models and model-based engineering methods have the promise of transforming the way that industrial engineers interact with production and logistics...
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers-- organizations and individuals--can use to help mitigate their...
Charles A. Barber, Carolyn Q. Burdette, Hugh V. Hayes, Melissa M. Phillips, Catherine A. Rimmer, Laura J. Wood, Lee L. Yu, Shaun P. Kotoski
HAMQAP was launched in collaboration with the NIH ODS in 2017. HAMQAP was established to enable laboratories to improve the accuracy of measurements in samples...
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device...
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use heuristics or approximations to examine programs...
John M. Libert, John D. Grantham, Bruce Bandini, Kenneth Ko, Shahram Orandi, Craig I. Watson
This report describes computational comparison measurements as well as match error analysis applied to fingerprint images collected by researchers of the...
Joshua M. Franklin, Gema Howell, Scott Ledgerwood, Jaydee Griffith
Public safety practitioners utilizing the forthcoming Nationwide Public Safety Broadband Network (NPSBN) will have smartphones, tablets and wearables at their...
The Public Safety Communications Research (PSCR) Division at the National Institute of Standards and Technology (NIST) conducted a survey to explore ways in...
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National...
Electric vehicles are becoming common on the Nation's roads, and the electric vehicle supply equipment infrastructure (EVSE) is being created to support that...
Kelley L. Dempsey, Eduardo K. Takamura, Paul Eavy, George Moore
The NISTIR 8011 capability-specific volumes focus on the automation of security control assessment within each individual information security capability. The...
Small Punch (SP) testing is a methodology that uses tiny disks (generally 8 mm in diameter and 0.5 mm thick) to estimate mechanical properties of metallic...
The NIST Instrumented Charpy Analysis Software (NICAS) is a standalone LabVIEW program that can be used to analyze instrumented impact tests in accordance with...
Marek Franaszek, Geraldine S. Cheok, Karl Van Wyk, Jeremy A. Marvel
Quality registration between the coordinate frames of a perception system and a robot is important for the efficient operation of autonomous systems in vision...
The National Institute of Standards and Technology is currently developing reference materials (RMs) to support the corn-to-ethanol industry. Two candidate RMs...
Within a variety of CFD applications, their maturity levels can be significantly varied, depending upon e.g., modeling approach and progress of application...
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against...