Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Talks

MediFor Nimble Challenge Evaluation 2017

Author(s)
Jonathan G. Fiscus, Haiying Guan, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, David M. Joy, August L. Pereira
NIST presentation slides for DARPA MediFor Program One-Year PI Meeting

Techniques to Evaluate Terrestrial Laser Scanner Errors

Author(s)
Bala Muralikrishnan, Prem K. Rachakonda
Forensic photography has been one of the most important tool for investigators over many decades. They preserve the history of the scene and provides a way for

SATE VI Ockham Sound Analysis Criteria

Author(s)
Paul E. Black
In preparation for SATE VI, we present our current thoughts on the Ockham Sound Analysis Criteria track. First, we explain the purpose of the Ockham track and

Resilience and System Level Security

Author(s)
Mark L. Badger
One approach for reducing damage caused by software vulnerabilities is to take advantage of emerging systems architecture patterns to strategically improve

DNA Error Rates

Author(s)
John Butler
The 1993 U.S. Supreme Court ruling in Daubert vs. Merrell-Dow Pharmaceuticals insists on knowledge regarding error rates and their application when evidence is

Using Network Analyses to Identify Emerging Research Areas

Author(s)
Susan L. Makar, Amanda J. Malanowski, Amy L. Trost
The Information Services Office (ISO) at the National Institute of Standards and Technology (NIST) is working to identify emerging research areas where NIST can

Mostly sunny with a chance of cyber

Author(s)

David W. Flater

Counting known vulnerabilities and correlating different factors with the vulnerability track records of software products after the fact is obviously feasible

Mostly sunny with a chance of cyber

Author(s)
David W. Flater
Counting known vulnerabilities and correlating different factors with the vulnerability track records of software products after the fact is obviously feasible