An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In the Laser Powder Bed Fusion (LPBF) additive manufacturing (AM) process, a high-speed scanning laser beam is employed to construct components by melting and
With youth increasingly accessing and using the internet, it is important to understand what they know about online privacy and security (OPS), and from where
Organizations around the world are using the NIST Phish Scale (NPS) in their phishing awareness training programs. As a new metric for measuring human phish-ing
Lorenzo Neil, Shanee Dawkins, Jody Jacobs, Julia Sharp
Organizations use simulated phishing awareness train-ing exercises to help users identify, detect, and defend against the ever-changing phishing threat
Clyburn Cunningham, Susanne M. Furman, Julie Haney
Our work-in-progress study aims to develop an understanding of current researcher-practitioner interaction points and associated challenges throughout the
Lorenzo Neil, Julie Haney, Kerrianne Buchanan, Charlotte Healy
Despite the importance of cybersecurity, there is no standard definition nor common terminology for explaining cybersecurity. Existing definitions largely
Ran Tao, Sukrut Prashant Phansalkar, Aaron M. Forster, Bongtae Han
Cure kinetics of epoxy molding compounds (EMCs) is a fundamental material property that affects the molding process of semiconductor chips and final package
Nathan Malarich, Fabrizio Giorgetta, Kevin Cossel, Brian Washburn, Jerome Genest, Nathan Newbury, Ian Coddington
We quantify the percent-level bias in dual-comb spectroscopy due to nonlinearities from the analog-to-digital conversion and demonstrate a compensation method
Nik Prajapati, Aly Artusio-Glimpse, Matt Simons, Samuel Berweger, Drew Rotunno, Maitreyi Jayaseelan, Kaleb Campbell, Christopher L. Holloway
Rydberg atoms show great promise for use as self-calibrated electric field sensors for a broad range of frequencies. Their response is traceable to the
This paper presents our research from our mixed-methods study analyzing how organizations determine security awareness program effectiveness. This paper is
Daniel Hussey, Peter Bajcsy, Paul A. Kienzle, Jacob LaManna, David Jacobson, Victoria DiStefano, Daniel Pelt, James Sethian
The goal of this study is to determine variable relationships and a computational workflow that yield the highest quality of three-dimensional reconstructions
Florian Bergmann, Nicholas Jungwirth, Bryan Bosworth, Jason Killgore, Eric Marksz, Tomasz Karpisz, Meagan Papac, Anna Osella, Lucas Enright, Christian Long, Nathan Orloff
Losses in mmWave transmission lines often exceed first-principles predictions based on measurements of dc resistivity and the nominal conductor geometry. In our
Yee-Yin Choong, Kerrianne Buchanan, Olivia Williams
Though much is known about how adults understand and use passwords, little research attention has been paid specifically to parents or, more importantly, to how
Encountering and/or engaging in risky online behavior is an inherent aspect of being an online user. In particular, youth are vulnerable to such risky be-havior
Julie Haney, Sandra Prettyman, Mary Frances Theofanos, Susanne M. Furman
Many professional domains require the collection and use of personal data. Protecting systems and data is a major concern in these settings, necessitating that
Unsupported smart home devices can pose serious safety and security issues for consumers. However, unpatched and vulnerable devices may remain connected because
The development of risk-targeted design loads for recovery-based design first requires consensus around acceptable levels of building risk, specifically in
Bivek Bista, Prafful Golani, Fengdeng Liu, Tristan Truttmann, Georges Pavlidis, Andrea Centrone, Bharat Jalan, Steven Koester
Given the ever increasing, global electricity consumption, improving the efficiency and reliability of high-power electronics is of paramount importance. Ultra
Retrofit and repair of structures occur under differing circumstances but are both necessary to improve existing building stock and increase resilience of
William Borders, Nitin Prasad, Brian Hoskins, Advait Madhavan, Matthew Daniels, Vasileia Gerogiou, Tiffany Santos, Patrick Braganca, Mark Stiles, Jabez J. McClelland
Increasingly higher demand in chip area and power consumption for more sophisticated artificial neural networks has catalyzed efforts to develop architectures
Smart and highly automated factories rely on time sensitive networks (TSNs) to coordinate the actions of robots working together to complete a task. The dense
There is no standard definition for cybersecurity, with current definitions often being technically-complex and targeted at practitioners and academics. However
KC Morris, Vincenzo Ferrero, Buddhika Hapuwatte, Noah Last, Nehika Mathur
A successful transition to a circular economy (CE) will require global participation, but the path to that transition will follow many unique routes depending
Nikolas Dale Barrera, Jacob Pawlik, Eugene Yoon, James Booth, Christian Long, Nathan Orloff, Ellis Meng, Angela Stelson
Parylene C thin films are commonly used as a passivation layer, protective coating, or substrate material in implantable medical devices. However, fluid or
Wesley Garey, Richard A. Rouil, Evan Black, Tanguy Ropitault, Weichao Gao
The Open Radio Access Network (O-RAN) Alliance is the industry led standardization effort, with the sole purpose of evolving the Radio Access Network (RAN) to