An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search tasks for professional searchers, such as law enforcement agencies, police officers, and patent examiners, are often more complex than open domain Web...
The mission of the National Institute of Standards and Technology's (NIST) CHIPS Research and Development Office (CHIPS R&D) under the Department of Commerce's...
In December 2023, NIST released a publication outlining a proposed data-sharing platform, titled "Building a Metrology Exchange to Innovate in Semiconductors...
Eduardo Takamura, Jeremy Licata, Victoria Yan Pillitteri
In 2017, NIST published a methodology for supporting the automation of SP 800-53 control assessments in the form of IR 8011. IR 8011 is a multi-volume series...
Michael Powell, John Hoyt, Aslam Sherule, Lynette Wilcox
Manufacturers are increasingly targeted in cyber-attacks. Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate...
Daniel Atherton, Reva Schwartz, Peter Fontana, Patrick Hall
The NIST (National Institute of Standards and Technology) glossary of terms related to trustworthy and responsible artificial intelligence (AI) and machine...
Lynn Baumeister, Whitney Quesenbery, Sharon J. Laskowski
Accessible vote by mail (AVBM) provides options for voters with disabilities to complete their absentee or vote by mail ballots independently and privately...
This document provides guidance and resources for how to test voting systems against the usability and accessibility requirements in the Voluntary Voting System...
James McCarthy, Joseph Brule, Dan Mamula, Karri Meldorf
The objective of this Cybersecurity Profile is to identify an approach to assess the cybersecurity posture of Hybrid Satellite Networks (HSN) that provide...
The purpose of this report is to document additional simulations that staff of the U.S. National Institute of Standards and Technology (NIST) performed, at the...
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural...
On February 22, 2022, NIST issued a public Request for Information (RFI), "Evaluating and Improving NIST Cybersecurity Resources: The Cybersecurity Framework...
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for...
This report summarizes the virtual workshop, Help Wanted: Growing a Workforce for Managing Privacy Risk, hosted by the International Association of Privacy...
NIST Special Publication 800-207 defines zero trust is a set of cybersecurity principles used when planning and implementing an enterprise architecture. These...
Executive Order (EO) 14028, "Improving the Nation's Cybersecurity," tasks the National Institute of Standards and Technology (NIST), in coordination with the...
This white paper highlights a recent mapping effort between the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)...
This paper applies technology-transfer efficiency metrics—filing rate and transfer rate— proposed in the academic literature on technology transfer to data on...
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information...
EVAP-COND is a software package that contains NIST's simulation models for a finned-tube evaporator and condenser. The "tube-by-tube" modeling scheme allows for...
Jennifer F. Helgeson, Eleanor D. Pierel, Kirstin Dow
To gather more in-depth information about how disasters affect businesses, the National Institute of Standards and Technology (NIST) and the National Oceanic...
Jennifer F. Helgeson, Juan F. Fung, Yating Zhang, Alfredo R. Roa Henriquez, Ariela Zycherman, Claudia Nierenberg, David T. Butry, Donna H. Ramkissoon
Small and medium-sized enterprises (SMEs) make up 44% of U.S. economic activities and are the lifeline for many local economies, employing 59 million people in...
The Dicke model famously exhibits a phase transition to a superradiant phase with a macroscopic population of photons and is realized in multiple settings in...
Ellen Voorhees, Nick Craswell, Bhaskar Mitra, Daniel Campos, Emine Yilmaz
The Deep Learning Track is a new track for TREC 2019, with the goal of studying ad hoc ranking in a large data regime. It is the first track with large human...
Donna F. Dodson, Murugiah Souppaya, Karen Scarfone
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...