An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We investigate a hybrid quantum system consisting of spatially separated resonant exchange qubits, defined in three-electron semiconductor triple quantum dots, that are coupled via a super- conducting transmission line resonator. By analyzing three
[Superseded by NIST SP 800-160 (November 2016, including updates as of 01-03-2016)] With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the
Raunak Bhinge, Jinkyoo Park, Kincho H. Law, David Dornfeld, Moneer Helu, Sudarsan Rachuri
Energy prediction of machine tools can deliver many advantages to a manufacturing enterprise, ranging from energy-efficient process planning to machine tool monitoring. Physics-based energy prediction models have been proposed in the past to understand the
Spencer J. Breiner, Eswaran Subrahmanian, Ram D. Sriram
As we extend the reach of the Internet through sensing and automation, networked systems interact more and more of our daily lives, requiring much greater sensitivity to social networks and greater robustness in the face of human behavior. A tremendous
Many engineering disciplines that interact with systems engineering use simulation tools to build models based on equations, which are solved to predict physical and informational behavior over time. Both kinds of engineering are concerned with physical
As new and exciting applications emerge using smart technologies, the Internet of Things, data analytics, and others for healthcare, a critical problem is emerging: the potential loss of "caring." The interplay of technology and caring has been discussed
Systems are integrations of devices or component elements and even other systems. The notion of a system comprehends engineered and biological or mechanical or physical systems. Examples include information and dynamical systems as well as integrations of
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information includes indicators of compromise; tactics, techniques, and procedures used by threat actors
This bulletin summarizes the information presented in NIST SP 800-183, Networks of 'Things'. This publication offers an underlying and foundational science to IoT based on the realization that IoT involves sensing, computing, communication, and actuation.
Although many aspects of passwords have been studied, no research to date has systematically examined how ambiguous terminology affects the user experience during password rule comprehension, a necessary precursor to password generation. Our research
In this paper we provide a broad framework for describing learning agents in general quantum environments. We analyze the types of environments which allow for quantum enhancements in learning, by contrasting environments to quantum oracles. We show that
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information security specialists and network managers. This guideline applies to federal IT systems and will