NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
This document is part of Case Studies in Cyber Supply Chain Risk Management-new research that builds on the CSD C-SCRM program's 2015 publications aimed at
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
The NBS Tables of Chemical Thermodynamic Properties is a collection of thermodynamic properties, published in book form, consisting of 103 tables with 14 330
New smart grid architectures, devices, systems, and applications require extensive data exchange, necessitating well-defined interfaces to transfer and
This report highlights the GCTC/SC3 Expo event held on July 11-12, 2019 to foster discussion of and collaboration to address the cybersecurity and privacy
Camila E. Young, Erica D. Kuligowski, Aashna Pradhan
Under the National Construction Safety Team Act, the National Institute of Standards and Technology (NIST) conducted an investigation of the May 22, 2011
Cuong T. Nguyen, Avi M. Gopstein, Danielle S. Byrnett, Kerry Worthington, Christopher Villarreal
From September to November 2018, the National Institute of Standards and Technology (NIST) partnered with the National Association of Regulatory Utility
Jarred C. Heigel, Brandon M. Lane, Lyle Levine, Thien Q. Phan, Justin G. Whiting
This document provides details on the files available for download in the data set "In situ thermography of the metal bridge structures fabricated for the 2018
Xiaoyu Alan Zheng, Johannes A. Soons, Robert M. Thompson, Sushama P. Singh, Cerasela Constantin
In 2009, a report by the National Academies called into question, amongst other issues, the objectivity of visual toolmark identification by firearms examiners
The National Institute of Standards and Technology (NIST) Pacific Marine Mammal Health Assessments (PMMHA) were initiated in 2010 as an expansion of NIST marine
This publication describes the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version 1.0). The Privacy
Optical quantum memory is a device that can store the quantum state of photons and retrieve it with high fidelity on demand. The device can be used to enhance
Francis M. Lavelle, Charles Goodhue, Douglas Lyons
The critical path method (CPM) is investigated as a tool for identifying recovery activities that control the timeline for restoration of key community
A bilateral study to compare guarded-hot-plate measurements at extended temperatures be-tween laboratories at the National Institute of Standards and Technology