An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case...
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
This document is part of Case Studies in Cyber Supply Chain Risk Management-new research that builds on the CSD C-SCRM program's 2015 publications aimed at...
This publication describes the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version 1.0). The Privacy...
Loic D. Lesavre, Priam C. Varin, Peter M. Mell, Michael S. Davidson, James Shook
Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing within...
Lisa C. Ng, Shrestha Som, William S. Dols, Steven J. Emmerich
The Department of Energy (DOE) estimates that air leakage (or infiltration) through building envelopes accounted for 6 % of the total energy consumed by...
This is a technical video that animates a Figure in a previously published manuscript. Hence, only requires notation. Published manuscript: https://pubs.acs.org...
On September 24, 2019, the National Institute of Standards and Technology (NIST) hosted a one- day workshop entitled "Human Factors in Smart Home Technologies."...
Elham Tabassi, Lisa Carnahan, Michael Hogan, Matthew Heyman
Emphasizing the importance of artificial intelligence (AI) to the future of the U.S. economy and national security, on February 11, 2019, the President issued...
The Security Content Automation Protocol (SCAP) version 2 (v2) automates endpoint posture information collection and the incorporation of that information into...
To facilitate the expansion of exports by U.S. manufactures, the National Institute of Standards and Technology (NIST) recommends updates (Appendices A and B)...
Mobile applications have become an integral part in the mission of the federal government and public safety. There exist many techniques that seek to assure...
This draft report was submitted to the President by the Secretaries of Commerce and Homeland Security as required by the May 11, 2017, Executive Order...
This economic analysis brief summarizes the efforts and results of the data collection and analysis of NIST's CRADA partner information. Summary statistics for...
David Cooper, Andrew Regenscheid, Murugiah Souppaya
A wide range of software products (also known as code)--including firmware, operating systems, mobile applications, and application container images--must be...
This analysis is an attempt to quantify the number and type of interactions between NIST and the U.S. economy from fiscal year 2010 through fiscal year 2014...
PSCR hosted over 80 stakeholders from industry, academia, public safety, and government to the NIST Boulder campus in August 2016. The August summit was a...
NIST performed a series of independent analyses to guide advanced manufacturing research investments. These studies identified a suite of technology...
The National Institute of Standards and Technologys (NIST) mission is to promote U.S. innovation and industrial competitiveness. To meet this mission, NIST...
NIST performed a series of independent analyses to guide advanced manufacturing research investments. This brief reports on results from the analysis of the...
NIST performed a series of independent analyses to guide advanced manufacturing research investments. This brief reports on the results from the analysis of...