Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Base Principal da Capacidade de Suporte Não Técnico da IoT

Author(s)
Katerina Megas, Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebbecca Herold
Recursos de suporte não técnicos são ações que um fabricante ou organização terceirizada executa em apoio à segurança cibernética de um dispositivo IoT. Esta...

Base de referencia de las capacidades de apoyo no técnicas del IoT

Author(s)
Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold
Las capacidades de apoyo no técnicas son acciones que realiza un fabricante o una organización de terceros en apoyo de la seguridad cibernética de un...

Strategic Plan for the Manufacturing USA Program

Author(s)
Robert G. Rudnitsky, Clifton Ray, Said Jahanmir
This document is the triennial strategic plan for the Manufacturing USA Program, as required by the program's authorizing statute. This strategic plan addresses...

Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Gorjan Alagic, Maxime Bros, Pierre Ciadoux, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone, Noah Waller, Yi-Kai Liu
The National Institute of Standards and Technology is in the process of evaluating public-key digital signature algorithms through a public competition-like...

The Global and Local Structure of Medium-Scale Pool Fires

Author(s)
Kunhyuk Sung, Ryan Falkenstein-Smith, Matthew Bundy, Marco Fernandez, Anthony Hamins
A series of experiments are reported that characterize key features of the structure of eight medium-scale pool fires (0.3 m to 0. 4 m) burning a variety of...

Service Mesh Proxy Models for Cloud-Native Applications

Author(s)
Ramaswamy Chandramouli, Zack Butcher, James Callaghan
The service mesh has become the de facto application services infrastructure for cloud-native applications. It enables the various runtime functions of an...

A Guide to the Smart Investment Tools

Author(s)
Douglas Thomas, Joshua D. Kneifel, Purav Parekh
This report serves as a guide to the Smart Investment Tool and Smart Investment Tool Express (SITExpress). These tools aid a user in conducting an investment...

TREC 2015 Dynamic Domain Track Overview

Author(s)
Ian Soboroff, Hui Yang, John Frank
Search tasks for professional searchers, such as law enforcement agencies, police officers, and patent examiners, are often more complex than open domain Web...

Summary Report: CHIPS R&D Program Standards Summit

Author(s)
Mary Bedner, Chris Greer
The mission of the National Institute of Standards and Technology's (NIST) CHIPS Research and Development Office (CHIPS R&D) under the Department of Commerce's...

Proxy Validation and Verification for Critical AI Systems

Author(s)
Phillip Laplante, Joanna DeFranco, D. Richard Kuhn, Jeff Voas
This white paper offers a suggestion that prior testing artifacts from similar AI systems can be reused for new AI software. Testing AI and Machine learning...
Was this page helpful?