An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Craig I. Schlenoff, Suzanne Lightman, Vinh Nguyen, Prem Rachakonda, Tao Zhang, Omar Aboul-Enein, Nicholas Barbosa, C Cameron Miller, Daniel Sawyer, Ann Virts
On-road autonomous vehicles are expected to significantly influence key aspects of everyday life. However, these complex systems can pose a safety risk in the...
The primary objective of the Structure Separation Experiment project is to assess structure-to-structure fire spread for structures located in the Wildland...
This is supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. NIST asked the Center for Statistics and Applications in...
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. This report summarizes the concerns raised...
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Standards and guidelines from the American...
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to...
Risk management is an important topic in any domain. With the growing acceptance and adoption of Industrial Artificial Intelligence (IAI), both the academic and...
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process...
David L. Duewer, Jeanice "Brown Thomas ", Margaret Kline, Willie May, Katherine E. Sharpless
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated 79 "Round...
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for...
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity...
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management...
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to...
This report of the Advanced Communications Technologies Working Group of the Interagency Committee on Standards Policy (ICSP) provides an overview of Federal...
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and...
Gema Howell, Kevin Gerard Brady, Don Harriss, Scott Ledgerwood
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as mobile devices, tablets and wearables...
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process...
David L. Duewer, Jeanice Brown Thomas, Stephen Young
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated a series...
This document provides a new Incident Handling framework dedicated to Operational Technology. This framework expands the traditional technical steps by giving...
NIST has developed a user-friendly spreadsheet-based software package for the Master Curve analysis of fracture toughness tests performed in the ductile-to...
NIST provides certified reference Charpy specimens to companies and laboratories around the world for the indirect verification of impact machines in accordance...
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more...
SCAP Composer is a software application from the National Institute of Standards and Technology (NIST) for creating Security Content Automation Protocol (SCAP –...
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Ryan Savino, Tim Knoll, Uttam Shetty, Mourad Cherfaoui, Raghu Yeluri, Don Banks, Akash Malhotra, Michael Jordan, Dimitrios Pendarakis, Peter Romness
In today's cloud data centers and edge computing, attack surfaces have shifted and, in some cases, significantly increased. At the same time, hacking has become...
In today's cloud data centers and edge computing, attack surfaces have significantly increased, cyber attacks are industrialized, and most security control...
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National...