An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Charpy Machine Verification Program at NIST in Boulder uses heat-treated 4340 steel for the production of indirect verification Charpy specimens at low- and
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop conducted April
Stanley W. Gilbert, Thomas Cleary, Paul A. Reneke, Richard Peacock, David Butry
It can be assumed that smoke alarms reduce reported fires and casualties by reducing on average the amount of time it takes to detect a fire. This paper sets
Lisa Ng, Dustin Poppendieck, Brian Polidoro, William Stuart Dols, Steven Emmerich, Andrew K. Persily
On March 11, 2020, the World Health Organization declared the novel coronavirus (COVID-19) outbreak a global pandemic. Following this announcement, school
Grace Hahm, Michael Nelson, Johanna Camara, Blaza Toman
Standard Reference Materials (SRMs) 2969 and 2970 are intended for 1) use in validating methods for determining concentrations of 25-hydroxyvitamin D2 (25(OH)D2
The National Institute of Standards and Technology (NIST) developed an experimental technique to measure the dynamic flow stress of metals under rapid heating
Michael Fagan, Katerina N. Megas, Jeffrey Marron, Kevin Gerard Brady, Barbara Bell Cuthill, Rebecca Herold
Non-technical supporting capabilities are actions a manufacturer or third-party organization performs in support of the cybersecurity of an IoT device. This
On-demand access to public safety data is critical to ensuring that public safety and first responders (PSFRs) can protect life and property during an emergency
Dianne L. Poster, C Cameron Miller, Richard Martinello, Norman Horn, Michael T. Postek, Troy Cowan, Yaw S. Obeng, John J. Kasianowicz
The National Institute of Standards and Technology (NIST) hosted an international workshop on ultraviolet-C (UV-C) disinfection technologies on January 14 – 15
Jeffrey Marron, Victoria Yan Pillitteri, Jon M. Boyens, Stephen Quinn, Gregory Witte
The document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a
George W. Quinn, James Matey, Patrick J. Grother, Edward Watters
In most current applications of iris recognition, matching is done by computer algorithms. The dominant algorithms are based on the work of John Daugman and are
Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development
To gather more in-depth information about how disasters affect businesses and nonprofits, the National Institute of Standards and Technology (NIST) and the
Community resilience is a topic of increasing interest in public policy and planning, although effective implementation will require an in-depth theoretical
Dhananjay Anand, Md Amimul Ehsan, Collin Freiheit, Thomas C. Linn, Tzong Hao Chen
This report outlines NIST's validation tools, developed to help address the smart grid'semergent needs and complement research and standards coordination
David Deisenroth, Sergey Mekhontsev, Brandon Lane, Leonard M. Hanssen, Ivan Zhirnov, Vladimir Khromchenko, Steven Grantham, Daniel Cardenas-Garcia, Alkan Donmez
This paper describes advances in measuring the characteristic spatial distribution of surface temperature and emissivity during laser-metal interaction under
Deployment architecture in cloud-native applications now consists of loosely coupled components, called microservices, with all application services provided
Amy Mahn, Daniel Topper, Stephen Quinn, Jeffrey Marron
This document intends to provide direction and guidance to those organizations – in any sector or community – seeking to improve cybersecurity risk management
Non-targeted analysis is the determination of the chemical composition of a complex mixture without a priori knowledge regarding the identities or quantities of
Piyachai Chansuk, Gulen Ozkula, Chia-Ming Uang, John Harris
Twenty-one W24 hot-rolled columns of ASTM A992 steel with five different sections were tested in Phase 1 of this research program to investigate the effects of
MARYAM ABDUL-RAHMAN, Melissa M. Phillips, Walter Brent Wilson
NIST launched a CannaQAP in 2020 to improve the comparability of the analytical measurements in forensic and Cannabis (hemp and marijuana) testing laboratories
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms
Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Cagdas Calik, Lawrence E. Bassham, Jinkeon Kang, John M. Kelsey
The National Institute of Standards and Technology (NIST) is in the process of selecting one or more authenticated encryption and hashing schemes suitable for
Kelley L. Dempsey, Victoria Yan Pillitteri, Andrew Regenscheid
An organization often has mission and business-based needs to exchange (share) information with one or more other internal or external organizations via various
The ASTM Interlaboratory Study (ILS) #1547 (Determining T0,X at Elevated Loading Rates) was launched in 2019 under the leadership of MPA Stuttgart (Germany)
As monoclonal antibodies have become a vital resource in medicine, knowledge of their complex molecular structures has increased in importance. Thousands of