An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Superancillary equations have been developed for the default multiparameter equations of state (EOS) for all 147 pure fluids in NIST REFPROP 10.0. These...
This environmental scan provides a broad view of the forensic science environment (as of 2023) and characterizes high-level historical and current issues and...
This document describes a new approach to localizing the iris boundaries in non-ideal iris images. The proposed algorithm starts by applying a series of...
NIST Handbook 150-18 presents the technical requirements and guidance for the accreditation of testing laboratories under the National Voluntary Laboratory...
Craig A. Davis, Laurie A. Johnson, Anne Kiremidjian, Alexis Kwasinski, Thomas Denis O'Rourke, Ellis Stanley, Kent Yu, Farzin Zareian, Katherine Johnson, Ayse Hortacsu
Lifeline infrastructure systems provide services to support communities, including life safety, public health, and social-economic factors. They require both...
Craig A. Davis, Laurie A. Johnson, Anne Kiremidjian, Alexis Kwasinski, Thomas Denis O'Rourke, Ellis Stanley, Kent Yu, Farzin Zareian, Katherine Johnson, Ayse Hortacsu
This Volume 2 report serves as a companion document to Volume 1 that presents a framework to guide the reader through steps to achieve system level functional...
Stephen Quinn, Nahla Ivy, Matthew Barrett, Greg Witte, R.K. Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management...
John McGuire, David Sefcik, Lisa Warfield, Yvonne Branden, Katrice Lippa
NIST Handbook 130 includes a compilation of model laws and regulations and related interpretations and guidelines designed to encourage uniformity in adoption...
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs...
Michael Nelson, Jerome Mulloor, Brian Lang, Blaza Toman, Antonio Possolo, William Perry, Alicia Lyle
Standard Reference Material (SRM) 1595a Tripalmitin is a high purity chemical substance having a certified value for purity, expressed as a mass fraction. It is...
Advances in robotics research have begun incorporating non-traditional materials, such as rubbers and elastomers, into the structure of robots giving them new...
In this work, we compiled, evaluated, and select recommended values for use for the melting points and boiling points of the alkali metals: lithium (Li), sodium...
In this work, we compiled and evaluated eutectic and peritectic phase-transition temperatures for metal-carbon (e.g., Co-C, Re-C) and metal carbide-carbon...
In this work, we compiled and evaluated both self-diffusion and binary-diffusion coefficients D for gases as a function of temperature. In this paper, we...
This technical note is part of a series of notes describing preliminary analyses and planning for the pre-conceptual design of a reactor to replace, in due...
James Cline, Marcus Mendenhall, David R. Black, Albert Henins, Jack Prothero
NIST certifies a suite of Standard Reference Materials (SRMs) to be used to evaluate specific aspects of the instrument performance and measurements via the...
In FY 2022, the 22 federal agencies that reported did not add or rescind any GUS in lieu of VCS, leaving a total of 80 previously reported GUS in lieu of VCS...
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers...
This document describes NIST's approach to mapping the elements of documentary standards, regulations, frameworks, and guidelines to a particular NIST...
Nicole Keller, Stephen Quinn, Matthew Barrett, Karen Scarfone, Matthew Smith, Vincent Johnson
The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative...
The CSF 2.0 represents a suite of resources (documents and applications) that can be used individually, together, or in combination over time as cybersecurity...
The Charpy reference specimens produced by NIST for the indirect verification of Charpy machines in accordance with ASTM E23 and ISO 148-1 must satisfy strict...
Kristina Rigopoulos, Stephen Quinn, Cherilyn Pascoe, Jeffrey Marron, Amy Mahn, Daniel Topper
The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity...
This guide provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick...
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary...
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary...
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O’Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites...
The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) held or maintained by regulated entities. The ePHI that a...