NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We describe Koala, an infrastructure Cloud simulator inspired by the Amazon Elastic Compute Cloud (EC2). We conduct a sensitivity analysis of Koala, revealing eight behavioral dimensions, which are influenced significantly by six parameters. Our findings
Documentation on using the Messaging Workbench (MWB) tool to edit the profile created for the NCPDP SCRIPT Implementation Guide: Version 10.6 NEWRX New Prescription and RXHRES Prescription History Response message structures.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Polk
Abstractive summarization has been a long-standing and long-term goal in automatic summarization, because systems that can generate abstracts demonstrate a deeper understanding of language and the meaning of documents than systems that merely extract
David A. Waltermire, Adam Halbardier, Mark Johnson
This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, correlating
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifiers and/or
The National Institute of Standards and Technology (NIST), with participation of the biometrics community, conducts evaluations of biometrics-based verification and identification systems. Among the more challenging is testing of automated latent
The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems
Emerging technologies for mesh networks can provide users with last-mile service to an access point by forwarding data through wireless relays instead of through expensive wireline infrastructure. While an extensive amount of literature on mesh networks
The linear dispersion structure is employed to accommodate the dynamic topology of cooperative networks, as well as to achieve higher throughput than conventional space-time codes based on orthogonal designs. Asynchronous Cooperative Liner Dispersion Codes
A critical challenge for military personnel when operating in foreign countries is effective communication with the local population. To address this issue, the Defense Advanced Research Projects Agency (DARPA) created the Spoken Language Communication and
Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As use of
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs), which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion
It is envisioned that one of the most important issues in Smart Grid will be to design a network architecture that is capable of providing secure and reliable two-way communication from meters to other Smart Grid domains. While networking technologies and
When multi-path fading and interference frequently disrupts a mobile radio communication system, it can seriously undermine its reliability for transmission of compressed video signals. In this paper, we present a pixel interlacing based video transmission
This is an editorial article for a special issue on smart grid. The main objective is to report on some, if not all, of smart grid future technical challenges. While acknowledging its limited coverage, this issue offers a wide range of interesting
This paper proposes an effective algorithm for spatial error concealment with accurate edge detection and partitioning interpolation. Firstly, a new method is used for detecting possible edge pixels and their matching pixels around the lost block. Then
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
The methodology described in this document was produced and developed by Lantana Consulting Group for the National Institute of Standards and Technology (NIST). It is part of a series of suitability analsyses on four healthcare standards performed under
This document supplements information about templated CDA in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST).
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT ProductsGuidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and
Understanding queuing dynamics of TCP is important for correct router buffer sizing as well as for optimizing the performance of the TCP protocol itself. However, modeling of buffer content dynamics under TCP has received relatively little attention given