Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Overview of the TREC 2006 Blog Track

Author(s)
Iadh Ounis, Maarten de Rijke, Craig Macdonald, Gilad Mishne, Ian Soboroff
The Blog track began this year, with the aim to explore the information seeking behaviour in the blogosphere. For this purpose, a new large-scale test...

Overview of TREC 2006

Author(s)
Ellen M. Voorhees
This report provides an overview of the fifteenth Text REtrieval Conference, TREC 2006. TREC 2006 was held at NIST on November 16-19, 2006. The conference was...

Rendering UML Activity Diagrams as Human-Readable Text

Author(s)
David Flater, Philippe A. Martin, Michelle L. Crane
We describe a modification of the Petri Net Linear Form notation to support the rendering of Unified Modeling Language (UML) Activity Diagrams as human-readable...

A Quantum Algorithm Detecting Concentrated Maps

Author(s)
Isabel M. Beichl, Stephen Bullock, David Song
We consider an arbitrary mapping for , some number of quantum bits. Using calls to a classical oracle evaluating and an classical bit data store, it is possible...

The Common Vulnerability Scoring System (CVSS)

Author(s)
Shirley M. Radack
This bulletin summarizes the guidance developed by NIST and published in NISTIR 7435 to help IT managers to make sense of data about the vulnerabilities of...

Information Technology Laboratory Brochure

Author(s)
Elizabeth B. Lennon
This brochure describes the programs of the Information Technology Laboratory (ITL). Following a letter from the ITL Director, ITL's nine programs are described...

The State of Container Security Standards

Author(s)
Shaw C. Feng, Simon P. Frechette
As cargo container security is a critical component in the U.S. homeland security, the communication among people in a chain of custody of a container needs to...

Guidelines on Securing Public Web Servers

Author(s)
Miles C. Tracy, Wayne Jansen, Karen A. Scarfone, Theodore Winograd
Web servers are often the most targeted and attacked hosts on organizations' networks. As a result, it is essential to secure Web servers and the network...
Was this page helpful?