An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kunhyuk Sung, Ryan Falkenstein-Smith, Matthew Bundy, Marco Fernandez, Anthony Hamins
A series of experiments are reported that characterize key features of the structure of eight medium-scale pool fires (0.3 m to 0. 4 m) burning a variety of...
Peng Liu, Kyehwan Lee, Fernando Cintron, Simeon Wuthier, Bhadresh Savaliya, Douglas Montgomery, Richard Rouil
This documentation serves as a blueprint for new researchers, offering a comprehensive guide on establishing an Open Radio Access Network (O-RAN) testbed from...
Jon M. Boyens, Rebecca McWhite, Laura Calloway, Nadya Bartol, Karen Scarfone
Use the CSF to Improve Your C-SCRM Processes. The CSF can help an organization become a smart acquirer and supplier of technology products and services. This...
Stephen Quinn, Victoria Pillitteri, Matthew Barrett, Matthew Smith, Gregory Witte
This guide provides an introduction to using the NIST Cybersecurity Framework (CSF) 2.0 for planning and integrating an enterprise-wide process for integrating...
Stephen Quinn, Cherilyn Pascoe, Matthew Barrett, Karen Scarfone, Gregory Witte
This Quick-Start Guide describes how to apply the CSF 2.0 Tiers. CSF Tiers can be applied to CSF Organizational Profiles to characterize the rigor of an...
Algorithms based on gradient descent for computing the elastic shape registration of two simple surfaces in 3−dimensional space and therefore the elastic shape...
Ramaswamy Chandramouli, Zack Butcher, James Callaghan
The service mesh has become the de facto application services infrastructure for cloud-native applications. It enables the various runtime functions of an...
Benjamin Place, Jessica Reiner, Jared Ragland, Alix Rodowa, Carolyn Burdette, Amy Cuthbertson, Catherine Rimmer, John Kucklick, Nathan Mahynski
Non-targeted analysis (NTA) is a technique for the identification of unknown chemicals in complex materials, such as novel per- and polyfluoroalkyl substances...
This report serves as a guide to the Smart Investment Tool and Smart Investment Tool Express (SITExpress). These tools aid a user in conducting an investment...
This report documents the performance of the National Institute of Standards and Technology (NIST) relative to that of its international peer organizations in...
Jennifer Helgeson, Christopher Clavin, Maria Dillard, Juan Fung, Christina Gore, Kenneth Harrison, Terri McAllister, Kelly Anderson, David Butry, Tasnim Ibn Faiz, Michael Gerst, Donghwan Gu, William Hughes, Dylan Sanderson
Significant vulnerabilities have been found in chips. Computer programs and methods have been developed to prevent, find, and mitigate them. We proposed Secure...
Search tasks for professional searchers, such as law enforcement agencies, police officers, and patent examiners, are often more complex than open domain Web...
This document addresses the need for effective data protection strategies in the evolving realm of cloud-native network architectures, including multi-cloud...
The mission of the National Institute of Standards and Technology's (NIST) CHIPS Research and Development Office (CHIPS R&D) under the Department of Commerce's...
Richard G. Gann, Brandon Hayes, Natasha Hanacek, Robin Materese, Matthew Hoehler
Over the past 50 years, the National Institute of Standards and Technology (NIST) has effectively fulfilled its responsibilities under the Federal Fire...
Phillip Laplante, Joanna DeFranco, D. Richard Kuhn, Jeff Voas
This white paper offers a suggestion that prior testing artifacts from similar AI systems can be reused for new AI software. Testing AI and Machine learning...
Christina Gore, Sindhuja Lakshmipuram Ranganath, Joshua D. Kneifel, Dunsin Fadojutimi, Jennifer Helgeson
This report contains a review of relevant literature to battery electric vehicle adoption. The first section outlines key trends in battery electric vehicle...
Ronald Lankone, Mauro Zammarano, Song Jhang, Ickchan Kim, David Goodwin, Gianluca Sarti, Stefano Gardi, Camillo Cardelli, Lipiin Sung
Vinyl siding has become a popular choice for residential exteriors across the United States. In its insulated form, this siding includes a shell, capstock, and...
Designing buildings for improved functional recovery represents a major shift in the current design paradigm. Given the novelty of the functional recovery...
New smoke alarms that have passed the broiling hamburger nuisance test introduced in 2015 to ANSI/UL 217 Standard for Safety Smoke Alarms have reached the...
Yating Zhang, Siamak Sattar, Dustin Cook, Katherine Johnson, Juan Fung
The building and construction sector is the largest carbon emitter, accounting for more than one-third of annual global emissions. The emissions can be divided...
Alkan Donmez, Jason Fox, Felix Kim, Brandon Lane, Maxwell Praniewicz, Vipin Tondare, Jordan Weaver, Paul Witherell
The rapid pace of maturation of metal additive manufacturing (AM) technologies, makes them an excellent candidate for the fabrication of nuclear power plant...
A new Reference Material (RM), designated RM 8013, has been developed for the temperature and enthalpy calibration of differential scanning calorimeters (DSCs)...
A new Standard Reference Material® (SRM®), designated SRM 2232a, has been certified for the temperature and enthalpy calibration of differential scanning...
Marian Merritt, SUSAN HANSCHE, BRENDA ELLIS, Julie Nethery Snyder, KEVIN SANCHEZ-CHERRY, DONALD WALDEN
This publication provides guidance for federal agencies and organizations to develop and manage a life cycle approach to building a Cybersecurity and Privacy...