Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 376 - 400 of 4384

Calculating Voxel-Polyhedron Intersections for Meshing Images

October 9, 2021
Author(s)
Stephen A. Langer, Andrew C.E. Reid
Finite element meshes constructed from 3D images are useful in materials science and medical applications when it is necessary to model the actual geometry of a sample, rather than an idealized approximation of it. Constructing the mesh involves computing

Metamorphic Testing for Hybrid Simulation Validation

October 5, 2021
Author(s)
Mohammed Farhan, Caroline Krejci, Megan Olsen, M S Raunak
Proper validation of a simulation model is essential to have confidence on its accuracy and credibility. However, many of the most effective approaches for simulation validation require access to data that may not always be available. Metamorphic Testing

2020 Cybersecurity and Privacy Annual Report

September 28, 2021
Author(s)
Patrick D. O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
During Fiscal Year 2020 (FY 2020), from October 1, 2019 through September 30, 2020, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy

Machine Learning for Access Control Policy Verification

September 16, 2021
Author(s)
Vincent C. Hu
Access control policy verification ensures that there are no faults within the policy that leak or block access privileges. As a software test, access control policy verification relies on methods such as model proof, data structure, system simulation, and

Neural Networks Based Domain Name Generation

September 1, 2021
Author(s)
Zheng Wang, Yang Guo
Domain generation algorithm (DGA) is commonly used to dynamically produce a large number of random domain names and select a small subset for actual use. DGA provides a method to make DNS mapping elusive and thereby make countermeasures ineffective. Modern

Voice Biometrics: Future Trends and ChallengesAhead

September 1, 2021
Author(s)
Doug Reynolds, Craig Greenberg
Voice has become woven into the fabric of everyday human-computer interactions via ubiquitous assistants like Siri, Alexa, Google, Bixby, Viv, etc. The use of voice will only accelerate as speech interfaces move to wearables \citestarner2002role}, vehicles

Quantifying Machining Process Inventories In Detailed Design

August 24, 2021
Author(s)
William Z. Bernstein, Till Boettjer, Deverajan Ramanujan
This paper quantifies machining process inventories based on commonly used techniques in various stages of the detailed design process. We investigate variabilities in process inventories between these techniques and their relation to manufacturing process

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords

August 11, 2021
Author(s)
Mary Theofanos, Yee-Yin Choong
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore children's practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world's cyber posture and

Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide

August 6, 2021
Author(s)
Amy Mahn, Daniel Topper, Stephen Quinn, Jeffrey Marron
This document intends to provide direction and guidance to those organizations – in any sector or community – seeking to improve cybersecurity risk management via utilization of the NIST Framework for Improving Critical Infrastructure Cybersecurity
Was this page helpful?