Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

Future Generation Wireless R&D Gaps Report

Author(s)
Nada T. Golmie
This report identifies and describes several of the most significant gaps within various components of the wireless industry. This report is intended to serve...

Domain Name System-Based Electronic Mail Security

Author(s)
Scott W. Rose, Karen M. Waltermire, Santos Jha, Chinedum Irrechukwu, William C. Barker
This document describes a security platform for trustworthy email exchanges across organizational boundaries. The project includes reliable authentication of...

Guide to LTE Security

Author(s)
Jeffrey A. Cichonski, Joshua M. Franklin, Michael J. Bartock
Cellular technology plays an increasingly large role in society as it has become the primary portal to the internet for a large segment of the population. One...

Road Mapping Workshop Report on Overcoming Barriers to Adoption of Composites in Sustainable Infrastructure

Author(s)
Richard J. Sheridan, Jeffrey W. Gilman, John Busel, David Hartman, Gale Holmes, Daniel Coughlin, Paul Kelley, Dustin Troutman, Jim Gutierrez, Charles Bakis, Robert Moser, Ellen Lackey, James R. Fekete, Stephanie Watson, Jae Hyun Kim, Aaron Forster, Ajay Krishnamurthy, Bharath N. Natarajan, William O'Donnell
The February 2017 "Road Mapping Workshop on Overcoming Barriers to Adoption of Composites in Infrastructure" brought together designers, manufacturers...

The Costs and Losses of Wildfires

Author(s)
Douglas S. Thomas, David T. Butry, Stanley W. Gilbert, David H. Webb, Juan F. Fung
This report enumerates all possible costs of wildfire management and wildfire-related losses. It, further, compiles estimates or proposes methods for estimating...

2016 NIST/ITL Cybersecurity Program: Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...

Framework for Cyber-Physical Systems: Volume 3, Timing Annex

Author(s)
David A. Wollman, Marc A. Weiss, YaShian Li-Baboud, Edward R. Griffor, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic...

Application Container Security Guide

Author(s)
Murugiah P. Souppaya, John Morello, Karen Scarfone
Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging...
Was this page helpful?