An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Alexander Maranghides, William Mell, Steven Hawks, Eric D. Link, Christopher U. Brown, Cartier P. Murrill, Erin Ashley
The Camp Fire started in the early morning of November 8, 2018 in vegetative fuels to the northeast of Concow, California. Concow is an unincorporated community...
Shanee T. Dawkins, Kristen Greene, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network, the public safety community is in the process of supplementing the use of land mobile radios...
Yvonne A. Branden, Tina G. Butcher, Richard A. Harshman, Lisa Warfield, Gloria D. Lee, John W. Barton
The 104th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 14 - 18, 2019, at the Hyatt Regency Milwaukee Hotel, Milwaukee...
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross Leo, Richard Lee, Nancy Landreville, Anand K. Mishra, Yien Wang, Rodrigo Sardinas
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses...
Celia Paulsen, Jon M. Boyens, Jeffrey Ng, Kris Winkler, James Gimbi
As awareness of cybersecurity supply chain risks grows among federal agencies, there is a greater need for tools that evaluate the impacts of a supply chain...
Amanda L. Forster, Dennis D. Leber, Amy E. Engelbrecht-Wiggans, Virginie A. Landais, Allen Chang, Emilien J. Guigues, Guillaume Messin, Michael A. Riley
It has long been a goal of the body armor testing community to establish an individualized, scientific-based protocol for predicting end-of-life of fielded body...
Patrick D. O'Reilly, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
During Fiscal Year 2019 (FY 2019), from October 1, 2018 through September 30, 2019, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy...
The shortage of cybersecurity professionals is a significant risk to The United States of America's overall national security and economic prosperity. The U.S...
P Phillips, Carina Hahn, Peter Fontana, David A. Broniatowski, Mark A. Przybocki
We introduce four principles for explainable artificial intelligence (AI) that comprise the fundamental properties for explainable AI systems. They were...
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in...
We describe the algorithmic foundations of an open-source numerical toolbox, written in the Octave language, for the creation of computer-generated binary and...
NIST Special Publication (SP) 922 is an aid in the identification of the chemical structures of polycyclic aromatic hydrocarbons (PAHs). The Structure Index...
Roger V. Bostelman, YaShian Li-Baboud, Soocheol Yoon, Mili Shah, Omar Y. Aboul-Enein
Advanced mobile manipulators offer the manufacturing industry the potential of a highly flexible system to perform precision assembly tasks where the...
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets...
Jeffrey A. Jargon, Dylan F. Williams, Angela C. Stelson, Christian J. Long, Aaron M. Hagerstrom, Paul D. Hale, John R. Stoup, Eric S. Stanfield, Wei Ren
In this report, we document the models and dimensional traceability of our WR15 rectangular waveguide standards for performing multiline thru-reflect-line...
We present a method to calculate dielectric and refractivity virial coefficients using the path-integral Monte Carlo formulation of quantum statistical...
NIST Handbook 150 contains the general procedures and requirements under which NVLAP operates as an unbiased third-party accreditation body. This handbook...
Roger V. Bostelman, YaShian Li-Baboud, Karl Van Wyk, Mili Shah
Exoskeletons are now being marketed by several manufacturers and yet there are currently no defined methods to measure the exoskeleton fit to the user. Proper...
This manual describes the computer program CONTAM version 3.4, developed by NIST. CONTAM is a multizone indoor air quality and ventilation analysis program...
Every day, in order to perform their jobs, workers exchange files over the Internet through email attachments, file sharing services, and other means. To help...
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H Jackson, Mark R Hurst, Ross Leo, Richard Lee, Nancy M Landreville, Anand Kumar Mishra, Yien Wang, Rodrigo Sardinas