Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 301 - 325 of 525

Establishing Traceability to NIST SRM 2391c: PCR-Based DNA Profiling Standard

September 16, 2015
Author(s)
Carolyn R. Steffen, Margaret C. Kline, David L. Duewer, Peter Vallone
The NIST Standard Reference Material (SRM) 2391c: PCR-Based DNA Profiling Standard was updated in April 2015 to contain new information relevant to the forensic community. Previously, there were certified genotypes for 24 autosomal STR markers plus

Rapid DNA Maturity Assessment

September 10, 2015
Author(s)
Erica L. Romsos, Sanae Lembirick, Peter Vallone
Two fully integrated rapid DNA platforms were tested as a part of a rapid DNA maturity assessment in the fall of 2014. The assessment was conducted with sets of blinded single-source reference samples to gauge the typing success of the current rapid DNA

Measuring Systematic and Random Error in Digital Forensics

July 24, 2015
Author(s)
Alexander J. Nelson, Simson L. Garfinkel
Recognized sources of error in digital forensics include systematic errors arising from implementation errors, and random errors resulting from faulty equipment. But as digital forensic techniques expand to include statistical machine learning, another

Analysis of the Boundary Conditions of the Spline Filter

July 21, 2015
Author(s)
D Ott, Hao H. Zhang, Daniel B. Ott, Xuezeng Zhao, Jun-Feng Song
The spline filter is a standard linear profile filter recommended by ISO/TS 16610-22 (2006). The primary advantage of the spline filter is that no end-effects occur as a result of the filter. The ISO standard also provides the tension parameter β=0.62524

Uncertainty in the number of contributors in the proposed new CODIS set

July 17, 2015
Author(s)
Michael D. Coble, Jo-Anne Bright, John S. Buckleton, James Curran
The probability that multiple contributors are detected within a forensic DNA profile improves as more highly polymorphic loci are analysed. The assignment of the correct number of contributors to a profile is important when interpreting the DNA profiles

A simple and fast spline filtering algorithm for surface metrology

July 14, 2015
Author(s)
Hao H. Zhang, Daniel B. Ott, Jun-Feng Song, D Ott, Wei Chu
The spline filters and the corresponding robust filters are commonly used filters recommended in ISO standards for surface evaluation. Generally, these linear and non-linear spline filters, composed of symmetric, positive-definite matrices, are always

STR Allele Sequence Variation: Current Knowledge and Future Issues

July 6, 2015
Author(s)
Katherine Gettings, Rachel A. Aponte, Peter Vallone, John M. Butler
This article reviews what is currently known about short tandem repeat (STR) allelic sequence variation in and around the twenty-four loci most commonly used throughout the world to perform forensic DNA investigations. These STR loci include D1S1656, TPOX

The Future of Forensic DNA Analysis

June 22, 2015
Author(s)
John M. Butler
The author's thoughts and opinions on where the field of forensic DNA testing is headed for the next decade are provided in the context of where the field has come over the past 30 years. Like the Olympic motto of "faster, higher, stronger", forensic DNA

Performance of a next generation sequencing SNP assay on degraded DNA

May 27, 2015
Author(s)
Katherine Gettings, Kevin M. Kiesler, Peter Vallone
Forensic DNA casework samples are often of insufficient quantity or quality to generate full profiles by conventional DNA typing methods. Amplification of STR loci is inherently limited in samples containing degraded DNA, as the cumulative size of repeat

Rapid PCR of STR Markers: Applications to Human Identification

April 23, 2015
Author(s)
Peter Vallone, Erica Romsos
Multiplex PCR with fluorescently labeled primers has been an essential method for the amplification of short tandem repeats used in human identify testing. Within the STR workflow of extraction, quantitation, amplification, separation, and detection

Biological Evidence Preservation: Considerations for Policy Makers

April 14, 2015
Author(s)
Shannan R. Williams, Melissa Taylor, Susan M. Ballou, Mark D. Stolorow, Margaret C. Kline, Phylis S. Bamberger, Larry Brown, Rebecca Brown, Burney Yvette, Davenport Dennis, Lindsay DePalma, Ted Hunt, Cynthia E. Jones, Ralph Keaton, William Kiley, Joseph Latta, Karen Thiessen, Gerry LaPorte, Linda E. Ledray, Randy Nagy, Brian Ostrom, Linda Schwind, Stephanie Stoiloff
Biological Evidence Preservation: Considerations for Policy Makers is a policy brief intended to provide guidance to legislators, advocates, and managers within criminal justice agencies that influence policy. The content in this document is informed by an

Mobile Device Tool Testing

February 19, 2015
Author(s)
Richard Ayers
The Computer Forensic Tool Testing program at NIST has spent several years researching and testing forensic tools capable of acquiring data from the internal memory of mobile devices and Subscriber Identity Modules (SIMs). Test reports provide a foundation

A Logic Based Network Forensics Model for Evidence Analysis

January 28, 2015
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Many attackers tend to use sophisticated multi-stage and/or multi-host attack techniques and anti-forensic tools to cover their traces. Due to the limitations of current intrusion detection and network forensic analysis tools, reconstructing attack
Was this page helpful?