An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Gorjan Alagic, Jacob Alperin-Sheriff, Daniel Apon, David Cooper, Quynh Dang, Yi-Kai Liu, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF...
Robert Pickering, Kathleen Onorevole, Rob Greenwood, Sarah Shadid
In August 2018, the National Institute of Standards and Technology (NIST), the U.S. Environmental Protection Agency (EPA) WaterSense program, and the Water...
This bulletin summarizes the information found in NIST SP 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations which discusses the...
Marc A. Weiss, YaShian Li-Baboud, Dhananjay Anand, Kevin G. Brady, Paul A. Boynton, Cuong T. Nguyen, Martin J. Burns, Avi M. Gopstein
We propose a general methodology for assessing the time accuracy and uncertainties and report results from a project to calibrate timing in the NIST CPS and...
Julie Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman
Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past research...
The CD4 glycoprotein is a component of the T cell receptor complex which plays an important role in the human immune response. This manuscript describes the...
Industrial wireless becomes a potential networking solution in many scenarios due to its flexibility and ease of communications in harsh environments...
Richard Kesler, Constandinos Mitsingas, Adam G. Quiat, Tonghun Lee, Daniel Madrzykowski, Gavin Horn
In todays structure fires, evolving fire loads and higher heat release rates mean that fires grow larger and faster than ever before. Firefighting personal...
Kelley L. Dempsey, Nedim S. Goren, Paul Eavy, George Moore
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011...
Walter G. Copan, Sivaraj Shyam-Sunder, Phillip A. Singerman, Paul R. Zielinski, Courtney F. Silverthorn, Charles J. Na, Henry N. Wixon, David C. Cranmer
The Return on Investment (ROI) Initiative for Unleashing American Innovation is part of a national conversation that is designed to advance the Lab-to-Market...
This handbook compiles uniform laws and regulations developed by the Committee on Laws and Regulations of the National Conference on Weights and Measures (NCWM)...
Stefan Herrig, Monika Thol, Allan H. Harvey, Eric Lemmon
An empirical fundamental equation of state is presented for heavy water (deuterium oxide, D2O). The equation is explicit in the reduced Helmholtz energy and...
The transactive energy (TE) abstract component model (Model) was the product of a tiger team effort engaged by the National Institute of Standards and...
In this report, we present network measurement of an ISA100.11a industrial wireless network operating with existing WiFi interference. The IEEE802.15.4-based...
This handbook has been prepared as a procedural guide for the compliance testing of net contents statements on packaged goods. Compliance testing of packaged...
Tina Butcher, Linda D. Crown, Richard A. Harshman, Gloria Lee
NIST Handbook 44 was first published in 1949, having been preceded by similar handbooks of various designations and in several forms. This 2019 edition was...
Zhigang Wang, Andy Tam, Ki Yong Lee, Anthony Hamins
For the first time, a set of measurements were made to characterize the time-varying temperature field in a medium-sized methyl alcohol (methanol; CH3OH) pool...
The Interagency International Cybersecurity Standardization Working Group (IICS WG) was established in December 2015 by the National Security Council's Cyber...
This report documents performance of face recognition algorithms applied to the one-to-many identification of faces appearing in portrait images. The primary...
In response to needs of a government-wide initiative in nanotechnology led by a subcommittee within the White Houses Office of Science and Technology Policy...
Nathalie Dupin, Ursula R. Kattner, Bo Sundman, Mauro Palumbo, Suzana G. Fries
Most models currently used for complex phases in the calculation of phase diagrams (Calphad) method are based on the compound energy formalism. The way this...