An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles
Robin Beckmüller, Roland Span, Eric W. Lemmon, Monika Thol
An empirical equation of state in terms of the Helmholtz energy is presented for n-octane. It is valid from the triple point temperature Ttp = 216.37 K to Tmax
Peter Mell, Jonathan Spring, Dave Dugal, Srividya Ananthakrishna, Francesco Casotto, Troy Fridley, Christopher Ganas, Arkadeep Kundu, Phillip Nordwall, Vijayamurugan Pushpanathan, Daniel Sommerfeld, Matt Tesauro, Christopher Turner
This work evaluates the validity of the Common Vulnerability Scoring System (CVSS) Version 3 ''base score'' equation in capturing the expert opinion of its
Manufacturers and manufacturing research organizations make investments to advance efficiency and competitiveness. Understanding the return for previously made
James McCarthy, Joseph Brule, Dan Mamula, Karri Meldorf
The objective of this Cybersecurity Profile is to identify an approach to assess the cybersecurity posture of Hybrid Satellite Networks (HSN) that provide
Craig I. Schlenoff, Suzanne Lightman, Vinh Nguyen, Prem Rachakonda, Tao Zhang, Omar Aboul-Enein, Nicholas Barbosa, C Cameron Miller, Daniel Sawyer, Ann Virts
On-road autonomous vehicles are expected to significantly influence key aspects of everyday life. However, these complex systems can pose a safety risk in the
Michael Frey, Mary Gregg, Jason Coder, Azizollah Kord, Melissa Midzor, Anna Otterstetter, Jeanne Quimby, Alec Weiss
The National Institute of Standards and Technology's Communications Technology Laboratory conducted a cellular communication system pilot experiment in the
Currently, global economies are using resources and contaminating resources faster than they can be regenerated. This resource depletion strains the economy and
The primary objective of the Structure Separation Experiment project is to assess structure-to-structure fire spread for structures located in the Wildland
This report provides a statistical review of the U.S. manufacturing industry. There are three aspects of U.S. manufacturing that are considered: (1) how the U.S
David Sefcik, Katrice Lippa, N. Alan Heckert, Stephen Benjamin, Ivan Hankins, Don Onwiler
The National Conference on Weights and Measures (NCWM) in partnership and cooperation with the NIST Office of Weights and Measures (OWM) and the Weights and
Transactive energy promises to support customer distributed energy resources (DER) integration into the electric grid, better accessing DER flexibility to
Dan Kuester, Xifeng Lu, Dazhen Gu, Azizollah Kord, Jake Rezac, Katie Carson, Marla L. Dowell, Elizabeth Eyeson, Ari Feldman, Keith Forsyth, Vu Le, John Marts, Mike McNulty, Kyle Neubarth, Andre Rosete, Matthew Ryan, Maija Teraslina
During the COVID-19 pandemic, NIST began a targeted campaign of measurements of averaged power and occupancy rate in the radio spectrum. The purpose was to
This is supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. NIST asked the Center for Statistics and Applications in
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Standards and guidelines from the American
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. This report summarizes the concerns raised
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to
The National Institute of Standards and Technology has developed advanced Database-Assisted Design (DAD) procedures for the design of structural members
Risk management is an important topic in any domain. With the growing acceptance and adoption of Industrial Artificial Intelligence (IAI), both the academic and
This report summarizes the findings of the NIST Scientific Integrity Program assessment of the program for the period between 1 January 2020 and 31 May 2022. It
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process
Buildings as a set of electric loads and sources can play an essential role in managing the stability of the power system in a smart grid. Traditionally
Nancy Lin, Scott Jackson, Stephanie Servetas, Kirsten Parratt, Joy Dunkers, Tara Eskandari, Sheng Lin-Gibson
On September 17, 2020, NIST hosted a virtual workshop to launch the Rapid Microbial Testing Methods (RMTM) Consortium. The RMTM Consortium aims to address the
Stefan Tschimben, Siddhartha Subray, Aric Sanders, Adam Wunderlich
This report documents collection methods for radio frequency in-phase/quadrature (I/Q) recordings of Wi-Fi and Bluetooth emissions in the 2.4 GHz and 5 GHz
Patrick D. O'Reilly, Kristina Rigopoulos, Greg Witte, Larry Feldman
During Fiscal Year 2021 (FY 2021) – from October 1, 2020, through September 30, 2021 – the NIST Information Technology Laboratory (ITL) Cybersecurity and