An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Craig A. Davis, Laurie A. Johnson, Anne Kiremidjian, Alexis Kwasinski, Thomas Denis O'Rourke, Ellis Stanley, Kent Yu, Farzin Zareian, Katherine Johnson, Ayse Hortacsu
Lifeline infrastructure systems provide services to support communities, including life safety, public health, and social-economic factors. They require both...
Craig A. Davis, Laurie A. Johnson, Anne Kiremidjian, Alexis Kwasinski, Thomas Denis O'Rourke, Ellis Stanley, Kent Yu, Farzin Zareian, Katherine Johnson, Ayse Hortacsu
This Volume 2 report serves as a companion document to Volume 1 that presents a framework to guide the reader through steps to achieve system level functional...
Stephen Quinn, Nahla Ivy, Matthew Barrett, Greg Witte, R.K. Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management...
John McGuire, David Sefcik, Lisa Warfield, Yvonne Branden, Katrice Lippa
NIST Handbook 130 includes a compilation of model laws and regulations and related interpretations and guidelines designed to encourage uniformity in adoption...
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs...
Michael Nelson, Jerome Mulloor, Brian Lang, Blaza Toman, Antonio Possolo, William Perry, Alicia Lyle
Standard Reference Material (SRM) 1595a Tripalmitin is a high purity chemical substance having a certified value for purity, expressed as a mass fraction. It is...
Advances in robotics research have begun incorporating non-traditional materials, such as rubbers and elastomers, into the structure of robots giving them new...
In this work, we compiled, evaluated, and select recommended values for use for the melting points and boiling points of the alkali metals: lithium (Li), sodium...
In this work, we compiled and evaluated eutectic and peritectic phase-transition temperatures for metal-carbon (e.g., Co-C, Re-C) and metal carbide-carbon...
In this work, we compiled and evaluated both self-diffusion and binary-diffusion coefficients D for gases as a function of temperature. In this paper, we...
This technical note is part of a series of notes describing preliminary analyses and planning for the pre-conceptual design of a reactor to replace, in due...
James Cline, Marcus Mendenhall, David R. Black, Albert Henins, Jack Prothero
NIST certifies a suite of Standard Reference Materials (SRMs) to be used to evaluate specific aspects of the instrument performance and measurements via the...
In FY 2022, the 22 federal agencies that reported did not add or rescind any GUS in lieu of VCS, leaving a total of 80 previously reported GUS in lieu of VCS...
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers...
This document describes NIST's approach to mapping the elements of documentary standards, regulations, frameworks, and guidelines to a particular NIST...
Nicole Keller, Stephen Quinn, Matthew Barrett, Karen Scarfone, Matthew Smith, Vincent Johnson
The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative...
The CSF 2.0 represents a suite of resources (documents and applications) that can be used individually, together, or in combination over time as cybersecurity...
The Charpy reference specimens produced by NIST for the indirect verification of Charpy machines in accordance with ASTM E23 and ISO 148-1 must satisfy strict...
Kristina Rigopoulos, Stephen Quinn, Cherilyn Pascoe, Jeffrey Marron, Amy Mahn, Daniel Topper
The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity...
This guide provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick...
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary...
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary...
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O’Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites...
The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) held or maintained by regulated entities. The ePHI that a...
Isaac Leventon, Michael Heck, Kevin B. McGrattan, Matthew Bundy, Rick D. Davis
This report provides an overview of quantitative measurement data and visual observations obtained from a series of 52 full-scale fire growth experiments...
Ramaswamy Chandramouli, Frederick Kautz, Santiago Torres-Arias
The predominant application architecture for cloud-native applications consists of multiple microservices, accompanied in some instances by a centralized...
Jeremy Cook, Charles Majkrzak, Hubert King, Dan Neumann
This report is relevant to the eventual replacement of NIST's NBSR research reactor with a new NIST research reactor – the NIST Neutron Source (NNS) - destined...
Yang Guo, Ramaswamy Chandramouli, Lowell Wofford, Rickey Gregg, Gary Key, Antwan Clark, Catherine Hinton, Andrew Prout, Albert Reuther, Ryan Adamson, Aron Warren, Purushotham Bangalore, Erik Deumens, Csilla Farkas
Security is essential component of high-performance computing (HPC). HPC systems often differ based on the evolution of their system designs, the applications...