Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Low-GWP Non-Flammable Alternative Refrigerant Blends for HFC-134a: Final Report

Author(s)
Piotr A. Domanski, Mark O. McLinden, Valeri I. Babushok, Ian Bell, Tara Fortin, Michael Hegetschweiler, Marcia L. Huber, Mark A. Kedzierski, Dennis Kim, Lingnan Lin, Gregory T. Linteris, Stephanie L. Outcalt, Vance (Wm.) Payne, Richard A. Perkins, Aaron Rowane, Harrison M. Skye
This project addresses the objectives of the Statement of Need number WPSON-17-20 "No/Low Global Warming Potential Alternatives to Ozone Depleting Refrigerants

What does the pixel measure?

Author(s)
David W. Flater
The pixel is often used as a unit of measurement in information technology. Unfortunately, there is not a simple, consistently-applicable answer to what it is a

Cannabis Quality Assurance Program: Exercise 2 Toxic Elements Final Report

Author(s)
Chuck Barber, Colleen E. Bryan Sallee, Carolyn Burdette, Shaun Kotoski, Melissa M. Phillips, Walter Brent Wilson, Laura Wood
In 2020, NIST launched CannaQAP to improve the comparability of the analytical measurements of cannabis and cannabis-derived products in forensic and cannabis

Health Assessment Measurements Quality Assurance Program: Exercise 7 Final Report

Author(s)
Chuck Barber, Carolyn Burdette, Hugh Hayes, Monique Johnson, Shaun Kotoski, Jacolin Murray, Melissa M. Phillips, Kate Rimmer, Andrea Yarberry, Laura J. Wood
The Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of

Using Business Impact Analysis to Inform Risk Prioritization and Response

Author(s)
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to

Measuring the Common Vulnerability Scoring System Base Score Equation

Author(s)
Peter Mell, Jonathan Spring, Dave Dugal, Srividya Ananthakrishna, Francesco Casotto, Troy Fridley, Christopher Ganas, Arkadeep Kundu, Phillip Nordwall, Vijayamurugan Pushpanathan, Daniel Sommerfeld, Matt Tesauro, Christopher Turner
This work evaluates the validity of the Common Vulnerability Scoring System (CVSS) Version 3 ''base score'' equation in capturing the expert opinion of its

Workshop Report: Standards and Performance Metrics for On-Road Autonomous Vehicles

Author(s)
Craig I. Schlenoff, Suzanne Lightman, Vinh Nguyen, Prem Rachakonda, Tao Zhang, Omar Aboul-Enein, Nicholas Barbosa, C Cameron Miller, Daniel Sawyer, Ann Virts
On-road autonomous vehicles are expected to significantly influence key aspects of everyday life. However, these complex systems can pose a safety risk in the

CSAFE Bitemark Thinkshop Report

Author(s)
NFN CSAFE, Kelly Sauerwein
This is supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. NIST asked the Center for Statistics and Applications in

Standards and Guidelines in Forensic Odontology

Author(s)
Karen Reczek
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Standards and guidelines from the American

Bitemark Analysis Reference List

Author(s)
Kelly Sauerwein
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process

Profile of the IoT Core Baseline for Consumer IoT Products

Author(s)
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for