An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This bulletin summarizes the information presented in NISTIR 7511, Rev. 4, "Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements". This is the fourth revision of the NISTIR which defines the requirements and
The problem of optimally removing a set of vertices from a graph to minimize the size of the largest resultant component is known to be NP-complete. Prior work has provided near optimal heuristics with a high time complexity that function on up to hundreds
Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in the
Peter Bajcsy, Mylene H. Simon, Stephen J. Florczyk, Carl G. Simon Jr., Derek Juba, Mary C. Brady
We address the problem of estimating 3D segmentation performance when segmentation is applied to thousands of confocal microscopy images (z-stacks) of cells. With a very large number of z-stacks, manual inputs to validate each segmentation result are
Constantinos Kolias, Angelos Stavrou, Jeff Voas, Irena Bojanova, D. Richard Kuhn
Our research began from asking whether there is a science behind the Internet of Things (IoT). We started from zero knowledge and no bias. The results of that work determined that indeed there is a science, but it is a science of numerous actors, that when
Wearable sensors are considered to be a key component of cognitive infocommunications systems. These sensors, which are basically enabler of inter-cognitive communication, will provide physical interfaces between humans and future information and
Melanie Cook, Stephen D. Quinn, David A. Waltermire, Dragos Prisaca
This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation Protocol (SCAP) validations. Validation is awarded based on a defined set of SCAP capabilities by
Ronald S. Ross, Kelley L. Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
[Superseded by SP 800-171 Rev. 1 (December 2016): https://www.nist.gov/publications/protecting- controlled-unclassified-information-nonfederal-systems-and-organizations] The protection of Controlled Unclassified Information (CUI) while residing in
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical object
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima) of a given objective that is modeled mathematically. This paper introduces the concept of a
Peter Bajcsy, Antonio Cardone, Joe Chalfoun, Michael W. Halter, Derek Juba, Marcin Kociolek, Michael P. Majurski, Adele P. Peskin, Carl G. Simon Jr., Mylene H. Simon, Antoine Vandecreme, Anne L. Plant, Mary C. Brady
The goal of this survey paper is to overview cellular measurements using optical microscopy imaging followed by automated image segmentation. The cellular measurements of primary interest are taken from mammalian cells and their components. They are
Many researchers have used simulation to investigate the spread of congestion in networks. These researchers often find that congestion can be modeled as a percolation process, spreading slowly under increasing load until a critical point. After the
With a growth of surveillance cameras, the amount of captured videos expands. Manually analyzing and retrieving surveillance video is labor intensive and expensive. It would be much more convenient to generate a video digest, with which we can view the
Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software's
Timothy J. Blattner, Walid Keyrouz, Milton Halem, Shuvra S. Bhattacharyya, Mary C. Brady
The scalability of applications is a key requirement to improving performance in hybrid and cluster computing. Scheduling code to utilize parallelism is difficult, particularly when dealing with dependencies, memory management, data motion, and processor
Goncalo Martins, Sajal Bhatia, Xenofon Koutsoukos, Keith A. Stouffer, CheeYee Tang, Rick Candell
Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of
Stephen D. Quinn, Murugiah P. Souppaya, Melanie Cook, Karen Scarfone
[Superseded by SP 800-70 Rev. 3 (December 2015, updated 12/8/2016): https://www.nist.gov/node/1125056?pubid=922414 ] A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT)
Aviral Shrivastava, J C. Eidson, Marc A. Weiss, Ya-Shian Li-Baboud, Hugo Andrade, Patricia Derler, Kevin Stanton
Timing and synchronization play a key role in advanced cyber-physical systems (CPS). Precise timing, as often required in safety-critical CPS, depends on hardware support for enforcement of periodic measure, compute, and actuate cycles. For general CPS
With the rise of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks. An important aspect of this trend has been the study of dramatic, but relatively infrequent, events that result
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Ronald G. Dixson, Mark Alexander Henn
Quantitative optical measurements of deep sub-wavelength, three-dimensional, nanometric structures with sensitivity to sub-nanometer details address an ubiquitous measurement challenge. A Fourier domain normalization approach is used in the Fourier optical
Two worlds that have operated independentlythe digital and physical worldsare now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and
Enterprise networks are migrating to the public cloud to acquire computing resources for a number of promising benefits in terms of efficiency, expense, and flexibility. Except some public services, the enterpise network islands in cloud are expected to be
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L. Chang
The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish a new
Magnus G. Find, Daniel C. Smith-Tone, Meltem Sonmez Turan
Multiplicative complexity is a complexity measure, which is defined as the minimum number of AND gates required to implement a given primitive by a circuit over the basis (AND, XOR, NOT), with an unlimited number of NOT and XOR gates. Implementations of