An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Department of Homeland Security (DHS) requires general human systems integration (HSI) criteria for the design and development of human-machine interfaces
Joshua M. Franklin, Charles W. Wergin, Harold Booth
This Interagency Report provides guidance to individuals scoring vulnerabilities using the Common Vulnerability Scoring System (CVSS) Version 2.0 scoring
This guide describes how to use the STEP File Analyzer, a software tool that generates a spreadsheet from a STEP (STandard for the Exchange of Product model
Jennifer M. Lynch, Rebecca S. Pugh, Paul R. Becker
The National Institute of Standards and Technology (NIST) expanded its analytical measurement and specimen banking capabilities into the U.S. Pacific Islands
David L. Duewer, Margaret C. Kline, Katherine E. Sharpless, Jeanice M. Brown Thomas, Sam A. Margolis
The National Institute of Standards and Technology coordinates the Micronutrients Measurement Quality Assurance Program (MMQAP) for laboratories that measure
Explores methods for defining a standardized matcher score for Automated Fingerprint Identification Systems (AFIS). A standardized score facilitates evaluating
Laura J. Wood, Melissa M. Phillips, Catherine A. Rimmer, Mary Bedner, Kaitlyn Chieh, Rick L. Paul
The NIST Dietary Supplement Laboratory Quality Assurance Program (DSQAP) was established in collaboration with the National Institutes of Health (NIH) Office of
Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies
The Department of Homeland Security (DHS) requires general human systems integration (HSI) criteria for the design and development of human-machine interfaces
Facial Age Estimation is an area of study new to the Face Recognition Vendor Test (FRVT) Still Track. While peripheral to traditional face recognition, it has
Svetlana Z. Lowry, Mala Ramaiah, Emily S. Patterson, David Brick, Ayse P. Gurses, Ant Ozok, Debora Simmons, Michael C. Gibbons
This report recommendations provide a first step in moving from a billing-centered perspective (i.e., focusing on ensuring maximum and timely reimbursement) to
Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources
John M. Libert, Shahram Orandi, John D. Grantham, Michael D. Garris
This study examines the use of the NIST Spectral Image Validation and Verification (SIVV) metric for the application of detecting the sample rate of a given
Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes
George Quinn, Patrick Grother, Mei Ngan, Nick Rymer
The IREX IV evaluation builds upon IREX III as a performance test of one-to-many iris recognition. This report is the second part of the IREX IV evaluation
Charles R. McLean, Sanjay Jain, Yung-Tsun Lee, Charles W. Hutchings
This document provides general guidance that is designed to help the U.S. Department of Homeland Security (DHS) Program Managers and other executives inside and
Kenneth A. Snyder, Li Piin Sung, Geraldine S. Cheok
Nondestructive test (NDT) methods and sensor technologies are evaluated in the context of providing input parameters to service life prediction models for
We investigate the feasibility, and the potential advantages and pitfalls of using modeling languages such as the Unified Modeling Language (UML), and the
A password policy may seem formal in the sense that it is written in a legalistic language, giving the impression of a binding contract. However, such policies
Step by step time-marching schemes are fundamental tools in the numerical exploration of well-posed nonlinear evolutionary partial differential equations
Amanda L. Forster, Kirk D. Rice, Michael A. Riley, Aaron M. Forster
This document describes recommendations provided to the National Institute of Justice's (NIJ) Special Technical Committee (STC) for the revision of the Stab
This paper introduces NIST's Sustainable Process Analytics Formalism (SPAF) to facilitate the use of simulation and optimization technologies for decision
Anantha Narayanan Narayanan, David J. Lechevalier, Katherine C. Morris, Sudarsan Rachuri
In order to develop the discipline of sustainable manufacturing, the language of discourse needs to be properly and clearly communicated, for both manufacturers
Commissioning is a quality assurance process for the design, construction and operation of buildings. Specifically, Building Commissioning is a process of