An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Felix M. Jimenez, Amanda Koepke, Mary Gregg, Michael R. Frey
A generative adversarial network (GAN) is an artificial neural network with a distinctive training architecture, designed to create examples that faithfully
Siham Khoussi, N. Alan Heckert, Abdella Battou, Saddek Bensalem
Probability distribution fitting of an unknown stochastic process is an important preliminary step for any further analysis in science or engineering. However
A new Standard Reference Material® (SRM) for portland cement clinker has been produced for the Office of Standard Reference Materials at the National Institute
Environmental concerns are driving regulations to reduce the use of hydrofluorocarbons (HFCs) with high global warming potential (GWP) as refrigerants in heat
This is the 2021 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable
Diane Ridgeway, Mary Theofanos, Terese Manley, Christine Task
The push for open data has made a multitude of datasets available enabling researchers to analyze publicly available information using various statistical and
Lisa Ng, Dustin Poppendieck, Brian Polidoro, William Stuart Dols, Steven Emmerich, Andrew K. Persily
On March 11, 2020, the World Health Organization declared the novel coronavirus (COVID-19) outbreak a global pandemic. Following this announcement, school
We tested a simple digital impedance bridge using two nominally equal resistors to form a 1:1 ratio. We focused on resolution and stability of the detectors
Alexandre C. Moreaux, Samantha Gamboa Quintiliani, David W. Griffith, Richard A. Rouil
In this paper, we expand previous analytical models to offer a more complete representation of Model B ProSe direct discovery. Using these models, we can obtain
Jason Coder, Aric Sanders, Michael R. Frey, Adam Wunderlich, Azizollah Kord, Jolene Splett, Lucas N. Koepke, Daniel Kuester, Duncan McGillivray, John M. Ladbury
This report presents a laboratory-based characterization of Long Term Evolution (LTE) User Equipment (UE) emissions under closed-loop power control, building on
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of
A data reduction tool was developed to conveniently post-process spherical constant volume flame experiments. Such experiments are employed to obtain laminar
Leticia Pibida, Ben Estes, Manuel Mejias, Gladys Klemic
In this work we provide a summary of the National Conference of Standards Laboratories (NCSL) Recommended Practice RP-1 calibration interval analysis method
Debra L. Kaiser, Robert Hanisch, James A. Warren, Zachary Trautt
In the past decade, numerous public and private sector documents have highlighted the need for materials data to facilitate advanced technologies in myriad
In February 2020, Office of Data and Informatics Group Lead Gretchen Greene asked Metadata Librarian Andrea Medina-Smith to perform a CoreTrustSeal (CTS) self
Victoria Yan Pillitteri, Kelley L. Dempsey, Chad Baer, Ron Rudman, Robert Niemeyer, Susan Urban
This publication describes an example methodology for assessing an organization's Information Security Continuous Monitoring (ISCM) program. It was developed
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os recursos de cibersegurança dos dispositivos são funções que os dispositivos de computação fornecem através dos seus próprios meios técnicos (ex: hardware e
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Las capacidades de ciberseguridad de dispositivo son características o funciones de ciberseguridad que los dispositivos informáticos proporcionan por sus
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os dispositivos da Internet das Coisas (IoT) muitas vezes não possuem recursos de segurança cibernética de acordo com os dispositivos que os seus clientes —
Michael Fagan, Katerina N. Megas, Karen Scarfone, Matt Smith
Los dispositivos de internet de las cosas (IoT) suelen carecer de las capacidades de ciberseguridad de dispositivo que los clientes (organizaciones y personas)
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management
Michael Fagan, Katerina N. Megas, Barbara Bell Cuthill, Mary Raguso, John Wiltberger
This report provides a summary of the discussion and findings from the NIST Cybersecurity Risks in Consumer Home IoT Devices virtual workshop in October 2020
The experimental vapor-liquid equilibrium (VLE) data for the binaries relevant to the catalytic fast pyrolysis of biomass have been collected and analyzed using
Mary Frances Theofanos, Jasmine Evans, Justyna Zwolak, Sandra Spickard Prettyman
In the fall of 2019, the National Institute of Standards and Technology (NIST) funded threes studies to better understand equity and inclusivity. The present st
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas
We discuss the measurement of aggregate levels of encounters in a population, a concept we call encounter metrics. Encounter metrics are designed so that they