An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Zineb Maasaoui, Abdella Battou, Mheni Merzouki, Ahmed LBATH
In the context of modern networks where cyber-attacks are increasingly complex and frequent, traditional Intrusion Detection Systems (IDS) often struggle to manage the vast volume of data and fail to detect novel attacks. Leveraging Artificial Intelligence
Benjamin Long, Guillaume Sousa Amaral, Philippe Dessauw, Hamza Bouhanni
The purpose of this paper is to reflect upon the Materials Genome Initiative (MGI) and our role as infrastructure developers within it. For context, we begin by considering a number of themes related to MGI activities such as modeling, design, building
Barry I. Schneider, Anthony J. Kearsley, Walid Keyrouz, Thomas C. Allison, chen qu
Graph neural networks have been successfully applied to machine learning models related to molecules and crystals, due to the similarity between a molecule/crystal and a graph. In this paper, we present three models that are trained with high-quality
This paper investigates one type of social engineering scam, where unsuspecting users inadvertently consent to hidden financial obligations by performing routine online actions, such as making a purchase. Terms and conditions, often dense and overlooked
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP
Joanna DeFranco, Joshua Roberts, David Ferraiolo, Daniel Compton
Objective: To address database interoperability challenges to improve collaboration among disparate organizations. Materials and Methods: We developed a lightweight system to allow broad but well-controlled data sharing while preserving local data
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
A key question in software assurance is, "How much testing is enough?" Coverage criteria such as statement or branch coverage were developed to help answer this question, but we also need to measure whether tests are sufficiently representative of inputs
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides
NoSQL database systems and data stores often outperform traditional RDBMS in various aspects, such as data analysis efficiency, system performance, ease of deployment, flexibility/scalability of data management, and users' availability. However, with an
Kamal Choudhary, Daniel Wines, Kevin Garrity, aldo romero, Jaron Krogel, Kayahan Saritas, Panchapakesan Ganesh, Paul Kent, Pascal Friederich, Vishu Gupta, Ankit Agrawal, Pratyush Tiwary, ichiro takeuchi, Robert Wexler, Arun Kumar Mannodi-Kanakkithodi, Avanish Mishra, Kangming Li, Adam Biacchi, Francesca Tavazza, Ben Blaiszik, Jason Hattrick-Simpers, Maureen E. Williams
Reproducibility and validation are major hurdles for scientific development across many fields. Materials science in particular encompasses a variety of experimental and theoretical approaches that require careful benchmarking. Leaderboard efforts have
David Kuhn, M S Raunak, Raghu Kacker, Jaganmohan Chandrasekaran, Erin Lanus, Tyler Cody, Laura Freeman
Autonomous systems are proliferating rapidly, with strong interest in everything from vacuum cleaners and lawnmowers, to self-driving cars and autonomous farm equipment. Can these systems be trusted to function safely? Many conventional software
This paper proposes a distributed Green Network Optimization (GNO) with Multi-Agent Reinforcement Learning (MARL). GNO-MARL combines: (a) Network Utility Maximization (NUM) based network management, given the capacity constraints, on a "fast" time scale
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries. The primary digital signature scheme that
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.
Kamal Choudhary, Matthew Evans, Gian-Marco Rignanese
The Open Databases Integration for Materials Design (OPTIMADE) application programming interface (API) empowers users with holistic access to a growing federation of databases, enhancing the accessibility and discoverability of materials and chemical data
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network
This paper builds upon our previous work on Network Security Traffic Analysis Platforms (NSTAP) [1], presenting an advanced framework for the real-time monitoring of network traffic and endpoint security in large-scale enterprises. We employ a fully
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for autographing digital assets (associating one's name with a digital
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e. a seed drawn from any ramdom source with sufficient entropy. The current paper formalizes a security notion for a DRBG, allowing the attacker to