An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jeff Voas, D. Richard Kuhn, Celia Paulsen, Kim B. Schaffer
Just as yeast, flour, water, and salt are to bread, algorithms, data structures, operating systems, database design, compiler design, and programming languages were computer science (CS) education's core ingredients in past years. Then, universities led
Economic, reliability, and low latency benefits of cloud computing model are the result of high level of dynamic resource sharing, made possible by high degree of system interconnectivity. This paper suggests more nuanced view of the effect of
The Hypervisor is a collection of software modules that provides virtualization of hardware resources (such as CPU/GPU, Memory, Network and Storage) and thus enables multiple computing stacks (basically made of an OS and Application programs) called
Aziza Ben Mosbah, David W. Griffith, Richard A. Rouil
In order to support the increasing demand for capacity in cellular networks, Long Term Evolution (LTE) introduced Proximity Services (ProSe) enabling Device-to-Device (D2D) communications, defining several services to support such networks. We are
With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the Internet of Things (IoT) Cybersecurity Colloquium hosted on NISTs campus in Gaithersburg, Maryland on October 19, 2017. It summarizes key takeaways from the presentations and discussions
In this article, we review trends in cybersecurity vulnerabilities from 2008-2015, analyze vulnerability types and distributions, and prospects for the near future.
In this paper, we describe a layered graphical model to analyze the mission impacts of attacks for forensic investigation. Our model has three layers: the upper layer models operational tasks and their dependencies; the middle layer reconstructs attack
The report describes and presents the results for text detection and recognition (TRAIT) evaluation in support of forensic investigations of digital media. These im- ages are of interest to NISTs partner law enforcement agencies that seek to employ text
This paper addresses the performance of polar codes in the context of the quantum key distribution (QKD) protocol. It introduces the notion of an interactive polar decoder and studies its performance. The results demonstrate that the interactive decoder is
In this paper, we present the results of the SHREC'17 Track: Point-Cloud Shape Retrieval of Non-Rigid Toys. The aim of this track is to create a fair benchmark to evaluate the performance of methods on the non-rigid point- cloud shape retrieval problem
Johannes A. Soons, Robert M. Thompson, Jun-Feng Song
To address concerns of subjectivity in firearm evidence examination, algorithms are being developed to compare firearm tool marks imparted on ammunition and generate a quantitative measure of similarity. The goal of this paper is to demonstrate a new
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and