An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Multidimensional scaling is a popular technique for visualizing dissimilarities between objects in complex datasets. For a single dataset, different initial
Kevin McGrattan, Isaac Leventon, Scott Bareham, Gabriel Taylor
This report documents a series of fire experiments performed within steel electrical enclosures and on open "ladder back" cable trays. The first objective is to
Business recovery after disasters is a complex process influenced by various factors. By compiling research on business recovery, this work seeks to support
Michael Fagan, Julie Haney, Daniel Eliot, Barbara Cuthill, Kristina Rigopoulos
This report documents the first SOUPS Design-A-Thon, which was held on August 11th, 2024, and focused on Designing Effective and Accessible Approaches for
William Fisher, Jason Ajmo, Sudhindra Umarji, Spike Dog, Mark Russell, Karen Scarfone
Most recent cybersecurity breaches have involved compromised credentials. Migrating from single-factor to multi-factor authentication (MFA) reduces the risk of
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 3666 Albumin and Creatinine in Frozen Human Urine is a secondary
This report summarizes the findings of the workforce preparation assessment initiative at the National Institute of Standards and Technology (NIST) using the
Rishabh Venketesh, Deogratias Kibira, Guodong Shao, Matthew Triebe
Digitization in manufacturing is a concept that, while having existed for some time, can now be realized because of advancements in IIoT (Industrial Internet of
Paul Watrobski, Murugiah Souppaya, Joshua Klosterman, William C. Barker, Jeffrey Marron, Blaine Mulugeta
This report describes an approach to capturing and documenting the network communication behavior of Internet of Things (IoT) devices. From this information
Juan Fung, Michael Hall, Jennifer Helgeson, Alden Dima, Anne Andrews, Jennifer Benkstein
This report presents the design and methodology of a survey conducted to evaluate the impact of changes to the organizational publication review policy at the
Morphing of face photographs present a threat to identity processes; for example, two people being able to use one passport. The threat exists in applications
This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled
Joshua Bienfang, Thomas Gerrits, Paulina Kuo, Alan Migdall, Sergey Polyakov, Oliver Slattery
The intention of this dictionary is to define relevant terms and metrics used in the characterization of single-photon detectors and sources with the goal to
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Christine Abruzzi, James L. Fenton, Naomi Lefkovitz
This guideline focuses on identity proofing and enrollment for use in digital authentication. During the process of identity proofing, an applicant provides
David Temoshok, Yee-Yin Choong, Andrew Regenscheid, Ryan Galluzzo, James L. Fenton, Justin Richer, Naomi Lefkovitz
This guideline focuses on the authentication of subjects who interact with government information systems over networks to establish that a given claimant is a
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential
NIST Handbook 150-3 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps
Alec Saville, Jake Benzing, Fan Zhang, Joseph Aroh, Jordan Weaver, Russell Evans, Nicholas Derimow, Samantha Webster, Nikolas Hrabe, Cassidy Allen, Newell Moser, May Martin, Jason Holm, Christin Aumayr, Tilman Seifert, Michael Hirtler
Supply chain challenges and health concerns have spurred the development of new Co-free, Cr-containing maraging steels with several new alloys already
This work provides recommendations for best practices that enable simplified, cost-effective interference testing that incorporates relevant aspects of
Lingnan Lin, Natascha Milesi-Ferretti, Glen Glaeser, Kyu Young Kim
Measurement and Uncertainty Analysis of Pressure Losses in a Push-to-Connect Elbow and Coupling The data on pressure losses in an elbow and a coupling are
This report summarizes recent technical work of the Applied and Computational Mathematics Division of the Information Technology Laboratory at the National
Tibor Furtenbacher, Allan Harvey, Attila G Császár
Based on the direct summation technique, improved ideal-gas partition functions and related thermochemical quantities are reported for the parent isotopologues
John McGuire, David Sefcik, Katrice Lippa, Scott Dolan, Isabel Baucom
This guide was developed to provide retailers with information about the best practice requirements for the unit pricing of commodities. The guide consists of