An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The NIST Neutron Source, or NNS, is a proposed reactor designed to eventually replace the aging National Bureau of Standards Reactor at the NIST Center for...
In the Laser Powder Bed Fusion (LPBF) additive manufacturing (AM) process, a high-speed scanning laser beam is employed to construct components by melting and...
With youth increasingly accessing and using the internet, it is important to understand what they know about online privacy and security (OPS), and from where...
Lorenzo Neil, Shanee Dawkins, Jody Jacobs, Julia Sharp
Organizations use simulated phishing awareness train-ing exercises to help users identify, detect, and defend against the ever-changing phishing threat...
Organizations around the world are using the NIST Phish Scale (NPS) in their phishing awareness training programs. As a new metric for measuring human phish-ing...
Clyburn Cunningham, Susanne M. Furman, Julie Haney
Our work-in-progress study aims to develop an understanding of current researcher-practitioner interaction points and associated challenges throughout the...
Lorenzo Neil, Julie Haney, Kerrianne Buchanan, Charlotte Healy
Despite the importance of cybersecurity, there is no standard definition nor common terminology for explaining cybersecurity. Existing definitions largely...
Ran Tao, Sukrut Prashant Phansalkar, Aaron M. Forster, Bongtae Han
Cure kinetics of epoxy molding compounds (EMCs) is a fundamental material property that affects the molding process of semiconductor chips and final package...
Nathan Malarich, Fabrizio Giorgetta, Kevin Cossel, Brian Washburn, Jerome Genest, Nathan Newbury, Ian Coddington
We quantify the percent-level bias in dual-comb spectroscopy due to nonlinearities from the analog-to-digital conversion and demonstrate a compensation method...
Nik Prajapati, Aly Artusio-Glimpse, Matt Simons, Samuel Berweger, Drew Rotunno, Maitreyi Jayaseelan, Kaleb Campbell, Christopher L. Holloway
Rydberg atoms show great promise for use as self-calibrated electric field sensors for a broad range of frequencies. Their response is traceable to the...
This paper presents our research from our mixed-methods study analyzing how organizations determine security awareness program effectiveness. This paper is...
Daniel Hussey, Peter Bajcsy, Paul A. Kienzle, Jacob LaManna, David Jacobson, Victoria DiStefano, Daniel Pelt, James Sethian
The goal of this study is to determine variable relationships and a computational workflow that yield the highest quality of three-dimensional reconstructions...
Florian Bergmann, Nicholas Jungwirth, Bryan Bosworth, Jason Killgore, Eric Marksz, Tomasz Karpisz, Meagan Papac, Anna Osella, Lucas Enright, Christian Long, Nathan Orloff
Losses in mmWave transmission lines often exceed first-principles predictions based on measurements of dc resistivity and the nominal conductor geometry. In our...
The IARPA BETTER (Better Extraction from Text Through Enhanced Retrieval) program held three evaluations of information retrieval (IR) and information...
Encountering and/or engaging in risky online behavior is an inherent aspect of being an online user. In particular, youth are vulnerable to such risky be-havior...
Yee-Yin Choong, Kerrianne Buchanan, Olivia Williams
Though much is known about how adults understand and use passwords, little research attention has been paid specifically to parents or, more importantly, to how...
Julie Haney, Sandra Prettyman, Mary Frances Theofanos, Susanne M. Furman
Many professional domains require the collection and use of personal data. Protecting systems and data is a major concern in these settings, necessitating that...
Unsupported smart home devices can pose serious safety and security issues for consumers. However, unpatched and vulnerable devices may remain connected because...
The precise measurement of magnetic fields is a fundamental tool of remote sensing. However, accurately measuring the direction of magnetic fields is...
The development of risk-targeted design loads for recovery-based design first requires consensus around acceptable levels of building risk, specifically in...
William Borders, Nitin Prasad, Brian Hoskins, Advait Madhavan, Matthew Daniels, Vasileia Gerogiou, Tiffany Santos, Patrick Braganca, Mark Stiles, Jabez J. McClelland
Increasingly higher demand in chip area and power consumption for more sophisticated artificial neural networks has catalyzed efforts to develop architectures...
Retrofit and repair of structures occur under differing circumstances but are both necessary to improve existing building stock and increase resilience of...
Bivek Bista, Prafful Golani, Fengdeng Liu, Tristan Truttmann, Georges Pavlidis, Andrea Centrone, Bharat Jalan, Steven Koester
Given the ever increasing, global electricity consumption, improving the efficiency and reliability of high-power electronics is of paramount importance. Ultra...
Abdeen Basel, Ehab Al-Sheer, Anoop Singhal, Latifur Khan, Kevin Hamlen
Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software, threatening the security of individuals, organizations, and...
Atasi Dan, Joel Rutkowski, Patrick McArdle, Erica Freire Antunes, Nathan Tomlin, Malcolm White, Michelle Stephens, John H. Lehman
Effect of oxygen (O2) plasma treatment on reflectance properties and surface morphology of CNT-based paint was investigated. We demonstrate a specular...
Smart and highly automated factories rely on time sensitive networks (TSNs) to coordinate the actions of robots working together to complete a task. The dense...
There is no standard definition for cybersecurity, with current definitions often being technically-complex and targeted at practitioners and academics. However...
KC Morris, Vincenzo Ferrero, Buddhika Hapuwatte, Noah Last, Nehika Mathur
A successful transition to a circular economy (CE) will require global participation, but the path to that transition will follow many unique routes depending...
Nikolas Dale Barrera, Jacob Pawlik, Eugene Yoon, James Booth, Christian Long, Nathan Orloff, Ellis Meng, Angela Stelson
Parylene C thin films are commonly used as a passivation layer, protective coating, or substrate material in implantable medical devices. However, fluid or...