An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This bulletin summarizes the information found in NIST SP 800-190, Application Container Security Guide and NISTIR 8176, Security Assurance Requirements for
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public
Richelle H. Streater, Anne-Michelle R. Lieberson, Adam L. Pintar, Zachary H. Levine
The MCML program for Monte Carlo modeling of light transport in multi-layered tissues has been widely used in the past 20 years or so. Here, we have re
Daniel G. Kuester, Duncan A. McGillivray, Adam J. Wunderlich, William F. Young
Wireless interference tests are often performed in shielded anechoic and semi-anechoic chambers near room temperature. The corresponding test condition
This guide was assembled for those manufacturers that may not have the resources to maintain staff dedicated to evaluating potential investments. It is an
On April 3-6, 2017, the National Institute of Standards and Technology (NIST) hosted the Model- Based Enterprise (MBE) Summit to identify challenges, research
The forensic science community has increasingly sought quantitative methods for conveying the weight of evidence. Experts from many forensic laboratories
Monique E. Johnson, Antonio R. Montoro Bustos, Elijah J. Petersen, Shannon K. Hanna, Karen E. Murphy, Lee L. Yu, Bryant C. Nelson, Michael R. Winchester
This protocol describes a strategy for separating Caenorhabditis elegans (C. elegans) from engineered nanomaterials, a critical step for accurate quantification
In order for security solutions for application container environments to effectively meet their security objectives, it is necessary to analyze those security
Civil infrastructure systems play an important role in community resilience. Without proper functioning of the infrastructure, especially power delivery
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous
This guide contains supplemental information for the NIST MBE PMI Validation and Conformance Testing Project. It is assumed that the reader has some familiarity
The Method of Uncertainty Minimization using Polynomial Chaos Expansions (MUM-PCE) was developed as a software tool to constrain physical models against
Alex Olivas, Chiara C. Ferraris, Nicos Martys, Edward Garboczi, Blaza Toman, William L. George
Rheological measurements are often performed using a rotational rheometer. In this type of rheometer, the tested fluid is sheared between two surfaces, one of