NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Michael Fagan, Katerina N. Megas, Karen Scarfone, Matt Smith
Los dispositivos de internet de las cosas (IoT) suelen carecer de las capacidades de ciberseguridad de dispositivo que los clientes (organizaciones y personas)
The experimental vapor-liquid equilibrium (VLE) data for the binaries relevant to the catalytic fast pyrolysis of biomass have been collected and analyzed using
Mary Frances Theofanos, Jasmine Evans, Justyna Zwolak, Sandra Spickard Prettyman
In the fall of 2019, the National Institute of Standards and Technology (NIST) funded threes studies to better understand equity and inclusivity. The present st
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas
Michael Fagan, Katerina N. Megas, Barbara Bell Cuthill, Mary Raguso, John Wiltberger
This report provides a summary of the discussion and findings from the NIST Cybersecurity Risks in Consumer Home IoT Devices virtual workshop in October 2020
This guide addresses wearing apparel, including children's apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents
Jasmine Evans, Amanda Koepke, Steven Lund, Mary Frances Theofanos
This report is part of a multi-phase mixed methods project that is designed to provide an in-depth look at the population of National Institute of Standards and
This guide addresses the compliance requirements for basic cosmetics and soap. The Federal Food, Drug, and Cosmetic Act (FD&C Act) defines cosmetics as
Melissa Taylor, Austin Hicklin, George Kiebuzinski
This document discusses issues that arise in the collection, dissemination, and use of datasets for use in biometric and forensic science research, and provides
WITHDRAWN January 4, 2023 The artificial intelligence (AI) revolution is upon us, with the promise of advances such as driverless cars, smart buildings
Mary Bedner, Jacolin Murray, Aaron A. Urbas, William A. MacCrehan, Walter Brent Wilson
The production and demand for hand sanitizers have increased dramatically during the coronavirus disease 2019 (COVID-19) health emergency. To be deemed
This guide addresses wearing apparel, including children's apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents
Jim McCarthy, Karen Reczek, Michael Bartock, Ya-Shian Li-Baboud, Suzanne Lightman, Arthur Scholz, Theresa Suloway, Doug Northrip, Joesph Brule
The national and economic security of the United States (US) is dependent upon the reliable functioning of critical infrastructure. Positioning, Navigation and
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
In today's highly connected, inter-dependent world, all organizations rely on others for critical products and services. However, the reality of globalization
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
Blockchain technology has enabled a new software paradigm for managing digital ownership in partial- or zero-trust environments. It uses tokens to conduct
Jeremy Marvel, Roger D. Eastman, Geraldine S. Cheok, Kamel S. Saidi, Tsai H. Hong, Elena R. Messina, Bob Bollinger, Paul Evans, Joyce Guthrie, Eric Hershberger, Carlos Martinez, Karen McNamara, James Wells
The special session on Technology Readiness Levels (TRLs) for Randomized Bin Picking was held during the morning session of the 2012 Performance Metrics for
Shelly Bagchi, Jeremy Marvel, Megan L. Zimmerman, Murat Aksu, Brian Antonishek
This report details the second annual, full-day workshop exploring the metrology necessary for repeatably and independently assessing the performance of robotic
Chuck Barber, Carolyn Burdette, Hugh Hayes, Caleb Luvonga, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Lee L. Yu
HAMQAP was launched in collaboration with the NIH Office of Dietary Supplements (ODS) in 2017. HAMQAP was established to enable laboratories to improve the
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020
Shelly Bagchi, Murat Aksu, Megan L. Zimmerman, Jeremy Marvel, Brian Antonishek
Verified and validated test methods, being necessary to measure the performance of complex systems, are important tools for driving innovation, benchmarking and
This paper explores a low-cost method to bridge analog public safety Land mobile radio (LMR) systems into a standards based Long Term Evolution (LTE) MCPTT
John M. Butler, Hariharan K. Iyer, Richard A. Press, Melissa Taylor, Peter Vallone, Sheila Willis
The National Institute of Standards and Technology (NIST) is a scientific research agency that works to advance measurement science, standards, and technology
This user guide describes an integrated set of C++ software tools for manipulating XML (eXtensible Markup Language) schemas and XML instance files. The tools
Robert D. Byers, David A. Waltermire, Christopher A. Turner
The purpose of this document is to leverage the strength of technical knowledge provided by the Common Vulnerabilities and Exposures (CVE) Numbering Authorities
Simulation and optimization methods are needed to design and operate large-scale, complex systems. Integrating the two presents a number of conceptual and
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
Access time generally describes the time associated with the establishment of a talk path upon user request to speak and has been identified as a key component