NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the Internet of Things (IoT) Cybersecurity Colloquium hosted on NISTs campus in Gaithersburg
The report describes and presents the results for text detection and recognition (TRAIT) evaluation in support of forensic investigations of digital media
This guide addresses apparel, including childrens apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents, sporting
This guide addresses apparel, including childrens apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents, sporting
Geraldine S. Cheok, Marek Franaszek, Karl Van Wyk, Jeremy A. Marvel
Accurate knowledge of an object's location is essential in automated robotic applications such as machine tending, pick-and-place operations, and part assembly
Patrick J. Grother, Mei L. Ngan, Lars Ericson, Kayee K. Hanaoka, Christopher Boehnen
This report documents NISTs execution of the Intelligence Advanced Research Projects Activity (IARPA) Face Recognition Prize Challenge 2017. The (FRPC) was
Spectrum monitoring serves as the eyes and ears of the spectrum management process and helps spectrum managers to plan and use frequencies, avoid incompatible
In order for security solutions for application container environments to effectively meet their security objectives, it is necessary to analyze those security
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous
This proceedings documents the July 11-12, 2017 "Enhancing Resilience of the Internet and Communications Ecosystem" workshop led by National Institute of
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
[Superseded by NISTIR 8183 (September 2017, Includes updates as of May 20, 2019)]This document provides the Cybersecurity Framework (CSF) implementation details
Each year the U.S. Department of Commerce (DOC) provides a report to the Office of Management and Budget (OMB) summarizing federal agency use of government
The National Institute of Standards and Technology has constructed a testbed to measure the performance impact induced by cybersecurity technologies on
The National Institute of Standards and Technology (NIST) has established a Vitamin D Metabolites Quality Assurance Program (VitDQAP) in collaboration with the
Maria Lorna A. De Leoz, David L. Duewer, Stephen E. Stein
The National Institute of Standards and Technology coordinated an interlaboratory study for laboratories that measure glycosylation in monoclonal antibodies
Haiying Guan, Daniel F. Zhou, Jonathan G. Fiscus, John S. Garofolo, James M. Horan
In this report we describe a novel framework for evaluation of video analytics which uses video quality metric prediction as a measurement of the system
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011
This volume introduces concepts to support automated assessment of most of the security controls in NIST Special Publication (SP) 800-53. Referencing SP 800-53A
Background: Wireless technology has great appeals to many manufacturers, in this case industrial automation systems, which include process control, discrete
The National Institute of Standards and Technology has constructed a testbed to measure the performance impact of cybersecurity defenses on Industrial Control
All cities can be seen as a collection of commons. Commons are spaces, services and resources shared by the citizenry. Any change in the state of any one of the
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
Kerry McKay, Lawrence E. Bassham, Meltem Sonmez Turan, Nicky Mouha
NIST-approved cryptographic standards were designed to perform well using general-purpose computers. In recent years, there has been increased deployment of