An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This publication provides guidelines for evaluating data from advanced mass calibrations and for establishing measurement assurance programs in precision mass
This publication contains good laboratory practices, good measurement practices, and standard operating procedures to support the Basic Mass CD-ROM (SP 1001, SP
The National Institute of Standards and Technology coordinates the Micronutrients Measurement Quality Assurance Program (MMQAP) for laboratories that measure
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the Internet of Things (IoT) Cybersecurity Colloquium hosted on NISTs campus in Gaithersburg
The report describes and presents the results for text detection and recognition (TRAIT) evaluation in support of forensic investigations of digital media
This guide addresses apparel, including childrens apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents, sporting
This guide addresses apparel, including childrens apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents, sporting
Geraldine S. Cheok, Marek Franaszek, Karl Van Wyk, Jeremy A. Marvel
Accurate knowledge of an object's location is essential in automated robotic applications such as machine tending, pick-and-place operations, and part assembly
Patrick J. Grother, Mei L. Ngan, Lars Ericson, Kayee K. Hanaoka, Christopher Boehnen
This report documents NISTs execution of the Intelligence Advanced Research Projects Activity (IARPA) Face Recognition Prize Challenge 2017. The (FRPC) was
Spectrum monitoring serves as the eyes and ears of the spectrum management process and helps spectrum managers to plan and use frequencies, avoid incompatible
In order for security solutions for application container environments to effectively meet their security objectives, it is necessary to analyze those security
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous
This proceedings documents the July 11-12, 2017 "Enhancing Resilience of the Internet and Communications Ecosystem" workshop led by National Institute of
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
[Superseded by NISTIR 8183 (September 2017, Includes updates as of May 20, 2019)]This document provides the Cybersecurity Framework (CSF) implementation details
Each year the U.S. Department of Commerce (DOC) provides a report to the Office of Management and Budget (OMB) summarizing federal agency use of government
The National Institute of Standards and Technology has constructed a testbed to measure the performance impact induced by cybersecurity technologies on
Maria Lorna A. De Leoz, David L. Duewer, Stephen E. Stein
The National Institute of Standards and Technology coordinated an interlaboratory study for laboratories that measure glycosylation in monoclonal antibodies
The National Institute of Standards and Technology (NIST) has established a Vitamin D Metabolites Quality Assurance Program (VitDQAP) in collaboration with the
Haiying Guan, Daniel F. Zhou, Jonathan G. Fiscus, John S. Garofolo, James M. Horan
In this report we describe a novel framework for evaluation of video analytics which uses video quality metric prediction as a measurement of the system
This volume introduces concepts to support automated assessment of most of the security controls in NIST Special Publication (SP) 800-53. Referencing SP 800-53A
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011
Background: Wireless technology has great appeals to many manufacturers, in this case industrial automation systems, which include process control, discrete