An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mauro Zammarano, Matthew S. Hoehler, John R. Shields, Andre L. Thompson, Ickchan Kim, Isaac T. Leventon, Matthew F. Bundy
In this work, we investigated fire growth in a furnished compartment intended to mimic a living room where a couch was the main fuel load. Three TB-117-2013
This publication provides security and privacy control baselines for the Federal Government. There are three security control baselines (one for each system
The software, used to process raw data coming from a residential air-conditioner or heat pump that is operating in the cooling mode, is described. The code was
This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database
The purpose of this research is to investigate how thermal comfort dynamics are impacted by energy-efficient or thermal comfort improvements in a low-load house
Simulation and optimization methods are needed to design and operate large-scale, complex systems. Integrating the two presents a number of conceptual and
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
Access time generally describes the time associated with the establishment of a talk path upon user request to speak and has been identified as a key component
This is the second of a series of reports on the performance of face recognition algorithms on faces occluded by protective face masks commonly worn to reduce
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document outlines the form and function of the USGv6 Test Program. In particular, it defines the components of the test program, their implementation and
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document defines the scope of accreditation for the USGv6 Test program, including test method validation procedures, laboratory accreditation process and
The NISTv6 Capabilities Table (NCT) provides a concise tabular summary of the technical requirements of the NISTv6 profile. For ease of reference, the NCT is
The USGv6 Capabilities Table (UCT) provides a concise tabular summary of the technical requirements of the USGv6 profile. For ease of reference, the UCT is
Additive manufacturing (AM) with cement-based materials is an emerging technology that has the potential to revolutionize concrete construction. The placement
Yannic Ramaye, Vikram Kestens, J. Charoud-Got, S. Mazoua, G. Auclair, Tae Joon Cho, Blaza Toman, Vincent A. Hackley, T. Linsinger
This report describes the production of SRM 1993/ERM-FD306, silica particles suspended in a borate buffer, certified for electrophoretic mobility and zeta
Yannic Ramaye, Vikram Kestens, J. Charoud-Got, S. Mazoua, G. Auclair, Tae Joon Cho, Blaza Toman, Vincent A. Hackley, T. Linsinger
This report describes the production of SRM 1992/ERM-FD305, silica particles suspended in a borate buffer, certified for electrophoretic mobility and zeta
The USGv6 Profile SDoC captures the results of conformance, interoperability and functional tests conducted and provides traceability back to the accredited
Solar photovoltaics (PV) continues to increase in market share. Policy decisions and the nature of solar markets continue to shift; however, it is likely that
Nicole D. Keller, Stephen Quinn, Karen Scarfone, Matthew Smith, Vincent Johnson
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships
Matthew P. Barrett, Nicole D. Keller, Stephen Quinn, Matthew Smith, Karen Scarfone
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships
Nicole K. Gingrich, Michael J. Hall, Isaac Patterson
In Science—the Endless Frontier, Vannevar Bush wrote that reaping the potential benefits of science conducted at federal laboratories requires the discoveries
NIST Handbook 150-4, NVLAP Ionizing Radiation Dosimetry, presents the technical requirements and guidance for the accreditation of laboratories under the NVLAP
Rodney Petersen, Danielle Santos, Karen Wetzel, Matthew Smith, Greg Witte
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a
Yooyoung Lee, Amy Yates, Haiying Guan, Jonathan G. Fiscus, Daniel Zhou
The interest of forensic techniques capable of detecting many different manipulation types has been growing, and system developments with machine learning
The FY 2018 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 23 participating agencies listed in