An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural
On February 22, 2022, NIST issued a public Request for Information (RFI), "Evaluating and Improving NIST Cybersecurity Resources: The Cybersecurity Framework
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for
This white paper highlights a recent mapping effort between the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)
This paper applies technology-transfer efficiency metrics—filing rate and transfer rate— proposed in the academic literature on technology transfer to data on
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information
Jennifer F. Helgeson, Eleanor D. Pierel, Kirstin Dow
To gather more in-depth information about how disasters affect businesses, the National Institute of Standards and Technology (NIST) and the National Oceanic
Jennifer F. Helgeson, Juan F. Fung, Yating Zhang, Alfredo R. Roa Henriquez, Ariela Zycherman, Claudia Nierenberg, David T. Butry, Donna H. Ramkissoon
Small and medium-sized enterprises (SMEs) make up 44% of U.S. economic activities and are the lifeline for many local economies, employing 59 million people in
The Dicke model famously exhibits a phase transition to a superradiant phase with a macroscopic population of photons and is realized in multiple settings in
Donna F. Dodson, Murugiah Souppaya, Karen Scarfone
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
This document is part of Case Studies in Cyber Supply Chain Risk Management-new research that builds on the CSD C-SCRM program's 2015 publications aimed at
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
This publication describes the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version 1.0). The Privacy
Lisa C. Ng, Shrestha Som, William S. Dols, Steven J. Emmerich
The Department of Energy (DOE) estimates that air leakage (or infiltration) through building envelopes accounted for 6 % of the total energy consumed by
This is a technical video that animates a Figure in a previously published manuscript. Hence, only requires notation. Published manuscript: https://pubs.acs.org
On September 24, 2019, the National Institute of Standards and Technology (NIST) hosted a one- day workshop entitled Human Factors in Smart Home Technologies.
The Security Content Automation Protocol (SCAP) version 2 (v2) automates endpoint posture information collection and the incorporation of that information into
To facilitate the expansion of exports by U.S. manufactures, the National Institute of Standards and Technology (NIST) recommends updates (Appendices A and B)
Mobile applications have become an integral part in the mission of the federal government and public safety. There exist many techniques that seek to assure
This economic analysis brief summarizes the efforts and results of the data collection and analysis of NIST's CRADA partner information. Summary statistics for
David Cooper, Andrew Regenscheid, Murugiah Souppaya
A wide range of software products (also known as code)--including firmware, operating systems, mobile applications, and application container images--must be