An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that the underlying network is a single device. While still at an early stage of development, SDN
Judy Chung, Michaela Iorga, Jeff Voas, Sangjin Lee
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA)-- diagnostics offer the possibility of securer IVA ecosystems. This paper explores security and privacy concerns with these
Dimitris Simos, Stavros Mekesis, D. Richard Kuhn, Raghu N. Kacker
We measured the combinatorial coverage of test vectors provided by the NIST Cryptographic Algorithm Validation Program (CAVP). Input models were defined and test vectors measured and analyzed for 2-way, 3-way, and 4-way combinatorial coverage. The results
We study the problem of recovering an unknown vector x in R^n from measurements of the form y_i = |a_i^T x|^2 (for i=1,...,m), where the vectors a_i in R^n are chosen independently at random, with each coordinate a_{ij} being chosen independently from a
Mohammadreza Mehrabian, Mohammad Khayatian, Aviral Shrivastava, John Eidson, Patricia Derler, Hugo A. Andrade, Ya-Shian Li-Baboud, Edward Griffor, Marc A. Weiss, Kevin Stanton
In order to test the performance and verify the correctness of Cyber-Physical Systems (CPS), the timing constraints on the system behavior must be met. Signal Temporal Logic (STL) can efficiently and succinctly capture the timing constraints on a given
To help maintain the reliability and integrity of the Internets Domain Name System (DNS), NIST is working with specialists from around the world to update the keys used by the DNS Security Extensions (DNSSEC) protocol to authenticate DNS data and avoid
Wireless connections are becoming popular in industrial environments that increasingly carry sensing and actuation data over the air. In industrial plants, activities of legacy wireless systems have shaped the channel usage in the radio spectrum bands for
Yohan Yoon, Jungseok Chae, Aaron M. Katzenmeyer, Heayoung Yoon, Joshua D. Schumacher, Sang M. An, Andrea Centrone, Nikolai B. Zhitenev
Polycrystalline thin film technology has shown great promise for low cost, high efficiency photovoltaics. To further increase the power efficiency, a firm understanding of microstructural properties of the devices is required. In this work, we investigate
Bradley Potteiger, William Emfinger, Himanshu Neema, Xenofon Koutsoukos, CheeYee Tang, Keith A. Stouffer
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
[Superseded by NISTIR 8183 (September 2017, Includes updates as of May 20, 2019)]This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the Cybersecurity
Michael E. Garcia, Paul A. Grassi, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
This bulletin outlines the updates NIST recently made in its four-volume Special Publication (SP) 800-63, Digital Identity Guidelines, which provide agencies with technical guidelines regarding the digital authentication of users to federal networked
IEEE802.15.6 is a radio interface standard for wireless connectivity of wearable and implantable sensors and actuators located inside or in close proximity to the human body i.e., Body Area Network (BAN). Medical applications impose stringent requirements
Conrad E. Bock, Fatma Dandashi, Sanford Friedenthal, Natalie Harrison, Steven Jenkins, Leon McGinnis, Janos Sztipanovits, Adelinde Uhrmacher, Eric Weisel, Lin Zhang
Understanding and developing complex systems requires collaboration between individuals with widely varying expertise. Communication between these individuals is facilitated by conceptual models. Conceptual models are early stage artifacts that integrate