An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Chuck Barber, Colleen E. Bryan Sallee, Carolyn Burdette, Shaun Kotoski, Melissa M. Phillips, Walter Brent Wilson, Laura Wood
In 2020, NIST launched CannaQAP to improve the comparability of the analytical measurements of cannabis and cannabis-derived products in forensic and cannabis
Chuck Barber, Carolyn Burdette, Hugh Hayes, Monique Johnson, Shaun Kotoski, Jacolin Murray, Melissa M. Phillips, Kate Rimmer, Andrea Yarberry, Laura J. Wood
The Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of
The FY 2017 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 24 participating agencies listed in
The COrona VIrus Disease – 2019 (COVID-19) pandemic has had a profound effect on the entire world. With the onset of the pandemic in 2020, also started various
Chuck Barber, Colleen E. Bryan Sallee, Carolyn Burdette, Shaun Kotoski, Melissa M. Phillips, Walter Brent Wilson, Laura Wood
In 2020, NIST launched Cannabis Laboratory Quality Assurance Program (CannaQAP) to improve the comparability of the analytical measurements of cannabis and
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident
James R. Lyle, Barbara Guttman, John Butler, Kelly Sauerwein, Christina Reed, Corrine Lloyd
This document is an assessment of the scientific foundations of digital forensics. We examined descriptions of digital investigation techniques from peer
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to
Peter Mell, Jonathan Spring, Dave Dugal, Srividya Ananthakrishna, Francesco Casotto, Troy Fridley, Christopher Ganas, Arkadeep Kundu, Phillip Nordwall, Vijayamurugan Pushpanathan, Daniel Sommerfeld, Matt Tesauro, Christopher Turner
This work evaluates the validity of the Common Vulnerability Scoring System (CVSS) Version 3 ''base score'' equation in capturing the expert opinion of its
Craig I. Schlenoff, Suzanne Lightman, Vinh Nguyen, Prem Rachakonda, Tao Zhang, Omar Aboul-Enein, Nicholas Barbosa, C Cameron Miller, Daniel Sawyer, Ann Virts
On-road autonomous vehicles are expected to significantly influence key aspects of everyday life. However, these complex systems can pose a safety risk in the
The primary objective of the Structure Separation Experiment project is to assess structure-to-structure fire spread for structures located in the Wildland
This is supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. NIST asked the Center for Statistics and Applications in
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Standards and guidelines from the American
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. This report summarizes the concerns raised
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to
Risk management is an important topic in any domain. With the growing acceptance and adoption of Industrial Artificial Intelligence (IAI), both the academic and
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process
David L. Duewer, Jeanice "Brown Thomas ", Margaret Kline, Willie May, Katherine E. Sharpless
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated 79 "Round
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to
This report of the Advanced Communications Technologies Working Group of the Interagency Committee on Standards Policy (ICSP) provides an overview of Federal
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and
Gema Howell, Kevin Gerard Brady, Don Harriss, Scott Ledgerwood
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as mobile devices, tablets and wearables
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process
David L. Duewer, Jeanice Brown Thomas, Stephen Young
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated a series
This document provides a new Incident Handling framework dedicated to Operational Technology. This framework expands the traditional technical steps by giving