NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Leticia Pibida, Ben Estes, Manuel Mejias, Gladys Klemic
In this work we provide a summary of the National Conference of Standards Laboratories (NCSL) Recommended Practice RP-1 calibration interval analysis method
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of
Debra L. Kaiser, Robert Hanisch, James A. Warren, Zachary Trautt
In the past decade, numerous public and private sector documents have highlighted the need for materials data to facilitate advanced technologies in myriad
In February 2020, Office of Data and Informatics Group Lead Gretchen Greene asked Metadata Librarian Andrea Medina-Smith to perform a CoreTrustSeal (CTS) self
Victoria Yan Pillitteri, Kelley L. Dempsey, Chad Baer, Ron Rudman, Robert Niemeyer, Susan Urban
This publication describes an example methodology for assessing an organization's Information Security Continuous Monitoring (ISCM) program. It was developed
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os recursos de cibersegurança dos dispositivos são funções que os dispositivos de computação fornecem através dos seus próprios meios técnicos (ex: hardware e
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Las capacidades de ciberseguridad de dispositivo son características o funciones de ciberseguridad que los dispositivos informáticos proporcionan por sus
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os dispositivos da Internet das Coisas (IoT) muitas vezes não possuem recursos de segurança cibernética de acordo com os dispositivos que os seus clientes —
Michael Fagan, Katerina N. Megas, Karen Scarfone, Matt Smith
Los dispositivos de internet de las cosas (IoT) suelen carecer de las capacidades de ciberseguridad de dispositivo que los clientes (organizaciones y personas)
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas
Michael Fagan, Katerina N. Megas, Barbara Bell Cuthill, Mary Raguso, John Wiltberger
This report provides a summary of the discussion and findings from the NIST Cybersecurity Risks in Consumer Home IoT Devices virtual workshop in October 2020
The experimental vapor-liquid equilibrium (VLE) data for the binaries relevant to the catalytic fast pyrolysis of biomass have been collected and analyzed using
Mary Frances Theofanos, Jasmine Evans, Justyna Zwolak, Sandra Spickard Prettyman
In the fall of 2019, the National Institute of Standards and Technology (NIST) funded threes studies to better understand equity and inclusivity. The present st
We discuss the measurement of aggregate levels of encounters in a population, a concept we call encounter metrics. Encounter metrics are designed so that they
This guide addresses wearing apparel, including children's apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents
Jasmine Evans, Amanda Koepke, Steven Lund, Mary Frances Theofanos
This report is part of a multi-phase mixed methods project that is designed to provide an in-depth look at the population of National Institute of Standards and
This guide addresses the compliance requirements for basic cosmetics and soap. The Federal Food, Drug, and Cosmetic Act (FD&C Act) defines cosmetics as
Melissa Taylor, Austin Hicklin, George Kiebuzinski
This document discusses issues that arise in the collection, dissemination, and use of datasets for use in biometric and forensic science research, and provides
Aziza Ben Mosbah, Samantha Gamboa Quintiliani, Richard A. Rouil
User Equipment (UE)-to-Network Relay functionality was introduced in Release 13 of the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) to
Ian Bell, Eric Lemmon, Monika Thol, Roland Span, Robin Beckmueller
New equations of state for the binary mixtures H2 + CH4, H2 + N2, H2 + CO2, and H2 + CO are presented. The results are part of an ongoing research project
The report highlights the manufacturing innovation projects developed by the institutes and their partners across the country to combat COVID-19. Manufacturing
This guide presents techniques for evaluating manufacturing investments from the perspective of environmentally sustainable manufacturing by pairing economic
Benjamin A. Molnar, Jarred C. Heigel, Eric P. Whitenton
This document provides details on the experiment and associated measurement files available for download in the dataset "In Situ Thermography During Laser