An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy verification and combinatorial methods for input space coverage measurement, which also has applications
Nicole Keller, Stephen Quinn, Matthew Barrett, Karen Scarfone, Matthew Smith, Vincent Johnson
The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships between elements of documents from cybersecurity
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O'Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The elements of an HSN may have
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to provide guidance concerning the threat of data
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to provide guidance around the threat of data breaches
In digital forensics, file system analysis is a precursor task to event reconstruction. Often, unallocated content within a file system is content of interest to an investigation, and thus recognition, extraction, and ascription of unallocated files are
Ramaswamy Chandramouli, Frederick Kautz, Santiago Torres-Arias
The predominant application architecture for cloud-native applications consists of multiple microservices, accompanied in some instances by a centralized application infrastructure, such as a service mesh, that provides all application services. This class
We present UniSpec, an attention-driven deep neural network designed to predict comprehensive collision-induced fragmentation spectra, thereby improving peptide identification in shotgun proteomics. Utilizing a training data set of 1.8 million unique high
Felix Adams, Austin McDannald, Ichrio Takeuchi, A. Gilad Kusne
Autonomous experimentation achieves user objectives more efficiently than Edisonian studies by combining machine learning and laboratory automation to iteratively select and perform experiments. Integrating knowledge from theory, simulations, literature
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is an approach where test suites are developed by efficiently covering interactions of parameter values and configuration settings. Multiple studies over the years have shown the interesting phenomenon where almost all defects in a
The Artificial Intelligence Risk Management Framework (AI RMF) produced by the National Institute of Standards and Technology (NIST) is a voluntary resource for organizations to manage the risks posed by AI technologies to individuals, communities, society
Joanna DeFranco, David Ferraiolo, Joshua Roberts, D. Richard Kuhn
Sharing data among disparate organizations can be extremely difficult, when the data comes from different database management systems (DBMS). Most problematic is that data stored at another organization most likely uses different DBMS schemas and
The current state of the art in software security -- describing weaknesses as CWEs, vulnerabilities as CVEs, and labeling CVEs with CWEs -- is not keeping up with the modern cybersecurity research and application requirements for comprehensively labeled
Hakju Oh, Boonserm Kulvatunyou, Albert T. Jones, Tim Finin
Today, businesses rely on numerous information systems to achieve their production goals and improve their global competitiveness. Semantically integrating those systems is essential for businesses to achieve both. To do so, businesses must rely on
Ronald Pulivarti, Natalia Martin, Frederick R. Byers, Justin Wagner, Justin Zook, Samantha Maragh, Jennifer McDaniel, Kevin Wilson, Martin Wojtyniak, Brett Kreider, Ann-Marie France, Sallie Edwards, Tommy Morris, Jared Sheldon, Scott Ross, Phillip Whitlow
Genomic data has enabled the rapid growth of the U.S. bioeconomy and is valuable to the individual, industry, and government because it has multiple intrinsic properties that in combination make it different from other types of high value data which
Encryption technology can be incorporated into access control mechanisms based on user identities, user attributes, or resource attributes. Traditional public-key encryption requires different data to have different keys that can be distributed to users
Ashrafi Akbar, Fariha Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuriasingham
Ontology enables semantic interoperability, making it highly valuable for cyber threat hunting. Community-driven frameworks like MITRE ATT&CK, D3FEND, ENGAGE, CWE and CVE have been developed to combat cyber threats. However, manually navigating these
Eduardo Takamura, Jeremy Licata, Victoria Yan Pillitteri
In 2017, NIST published a methodology for supporting the automation of SP 800-53 control assessments in the form of IR 8011. IR 8011 is a multi-volume series that starts with an overview of the methodology (volume 1) and provides guidance and
This document is the second part of a series of documents on the usability of electronic pollbooks. It contains a procedure for how e-pollbooks might be evaluated, including a preliminary protocol for running a usability test. It can be used by people
This publication is a report on the exploration of the use of electronic pollbooks (e-pollbooks) in elections. The scope of this report is on usability and accessibility of e-pollbooks, that is, their use by poll workers and voters, rather than on
Edward Griffor, Matthew Bundas, Chasity Nadeau, Jeannine Shantz, Thanh Nguyen, Marcello Balduccini, Tran Son
Artificial Intelligence (AI) is often critical to the success of modern business processes. Leveraging it, however, is non-trivial. A major hurdle is communication: discussing system requirements among stakeholders with different backgrounds and goals
Yeun Park, Paul Witherell, Albert T. Jones, Hyunbo Cho
As a multi-staged digital manufacturing process, Additive manufacturing (AM) inherently benefits from data analytics (DA) decision-making opportunities. The abundance of data associated with the various observations and measurements taken throughout the
Data-driven research in Additive Manufacturing (AM) has gained significant success in recent years. This has led to a plethora of scientific literature to emerge. The knowledge in these works consists of AM and Artificial Intelligence (AI) contexts that
Stephen Quinn, Nahla Ivy, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Karen Scarfone, Robert Gardner, Julie Chua
All enterprises should ensure that information and communications technology (ICT) risk receives appropriate attention within their enterprise risk management (ERM) programs. This document is intended to help individual organizations within an enterprise