NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This document describe a framework (with the acronym ERO-AA) for establishing an infrastructure for authentication and authorization of Emergency Response officials (ERO) who respond to various types of man-made and natural disasters. The population of
Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secure
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans. The revised
A widely used approach to image segmentation is to define corresponding segmentation energies and to compute shapes that are minimizers of these energies. In this work, we introduce a flexible and efficient numerical framework for minimization of such
Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form
Stephen D. Quinn, Karen A. Scarfone, Matthew P. Barrett, Christopher S. Johnson
The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. It
We present experimental measurements and analysis of RF interference between a passive RFID system and a generic frequency hopping communications system in the 902 928 MHz ISM radio band. Interference in both directions is considered, RFID to
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems. This publication updates federal contingency planning practices by integrating risk management
Chris Callison-Burch, Philipp Koehn, Christof Monz, Kay Peterson, Mark A. Przybocki, Omar F. Zaidan
This paper presents the results of the WMT10 and MetricsMATR10 shared tasks, which included a translation task, a system combination task, and an evaluation task. We conducted a large-scale manual evaluation of 104 machine translation systems and 41 system
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper reports on work in progress on developing a unified co-evolutionary/pricing framework for Mobile Sensor Networks (MSN) self-organization. MSN self-organization involves cooperative sensor positioning and formation of a multi-hop Mobile Ad-hoc
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately
This paper investigates the capabilities of the Bag-of-Words (BW) method in the 3D shape retrieval field. The contributions of this paper are: 1) the 3D shape retrieval task is categorized from different points of view: specific vs. generic, partial-to
Kamran Sayrafian, Vladimir V. Marbukh, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target tracking using a network of collaborative sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of prescribed
Daniel I. Genin, Vladimir Marbukh, Anastase Nakassis
This paper reports on work in progress on assessing and mitigating selfish routing vulnerability to strategic attacks. We explain mechanisms leading to this vulnerability, propose the corresponding game-theoretic model, solve this model for some particular
The purpose of this document is to describe the best practices that personnel from the National Institute of Standards and Technology (NIST) have developed and implemented to efficiently and effectively capture two-way, free-form speech-to-speech audio
Authentication assurance level taxonomies that have been specified in many real-world smart identity token deployments do not fully reflect all the security properties associated with their underlying authentication mechanisms. In this paper we describe
This document is a collection of twenty eight Complex Systems Image of the Month (IOM) illustrations. Each month as part of the Complex Systems Program in the Information Technology Laboratory an IOM is produced, posted to the Complex Systems web site and
Nathalie Yarkony, Kamran Sayrafian, Antonio Possolo
Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. However, the
Despite the potential for high-speed communications, stringent regulatory mandates on Ultra-Wideband (UWB) emission have hindered its commercial success. By combining resolvable UWB multipath from different directions, Multiple-Input Multiple-Output (MIMO)
Ian M. Soboroff, Craig Macdonald, Rodrygo Santos, Iadh Ounis
The TREC Blog track aims to explore information seeking behaviour in the blogosphere, by building reusable test collections for blog-related search tasks. Since, its advent in TREC 2006, the Blog track has led to much research in this growing field, and
The Media Independent Handover (MIH)architecture finalized by the IEEE 802.21 working group facilitates handovers between heterogeneous networks. The signaling messages exchanged between the network entities, namely Mobile Nodes (MNs) and Points of Service
A low complexity Parallel Interference Cancellation (PIC) technique is proposed to suppress Multi-Access Interference (MAI) and minimize near-far effect for multi-user communication using Direct-Sequence Code Division Multiple Access (DS-CDMA)