NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Dan Brodjieski, Allen Golbig, Karen Scarfone, Blair Heiserman
The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and assess macOS desktop and laptop system
Jim Filliben has inspired many scientists in a variety of domains across the National Institute of Standard and Technology (NIST) with his statistical data analysis. In our talk we will highlight the impact of his insights and methodologies on our projects
Abdeen Basel, Ehab Al-Sheer, Anoop Singhal, Latifur Khan, Kevin Hamlen
Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software, threatening the security of individuals, organizations, and governments. Although security teams strive to establish defense measures to thwart attackers, the
The massive digital information generated in conjunction with the ever-increasing phasor measurement data in the power grid has led to a tremendous constraint on the analysis and timely processing of real-time data. Under these conditions, leveraging
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and de- cision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of
Guodong Shao, Simon P. Frechette, Vijay Srinivasan
ISO has recently issued a series of standards (ISO 23247) that deals with a digital twin framework for manufacturing. It is a generic framework that can be specialized to enterprises engaged in different manufacturing processes, such as discrete, batch, or
Tanguy Ropitault, Steve Blandino, Anirudha Sahoo, Nada T. Golmie
In recent years, Wi-Fi has been shown to be a viable technology to enable a wide range of sensing applications, and Wi-Fi sensing has become an active area of research and development. Due to the significant and growing interest in Wi-Fi sensing, Task
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural coverage metrics, it is often difficult to determine if the code has been exercised sufficiently to
Krishna Khadka, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
Data is a crucial component in machine learning. However, many datasets contain sensitive information such as personally identifiable health and financial data. Access to these datasets must be restricted to avoid potential security concerns. Synthetic
Kim B. Schaffer, Peter Mell, Hung Trinh, Isabel Van Wyk
Receiving reports on suspected security vulnerabilities in information systems is one of the best ways for developers and services to become aware of issues. Formalizing actions to accept, assess, and manage vulnerability disclosure reports can help reduce
Murugiah Souppaya, Gema Howell, Karen Scarfone, Joshua Franklin, Vincent Sritapan
Mobile devices were initially personal consumer communication devices, but they are now permanent fixtures in enterprises and are used to access modern networks and systems to process sensitive data. This publication assists organizations in managing and
Rick Candell, Karl Montgomery, Mohamed Hany, Susruth Sudhakaran, Dave Cavalcanti
Time-sensitive networking (TSN) is emerging as a viable means to achieving deterministic quality of service (QoS) communications within mission critical industrial applications such as feedback control systems, robotics, and precision sensing and actuation
Orienting an entire organization toward sound security practices is an important, but non-trivial undertaking. A starting point for many organizations is to build a robust security awareness program, training employees to recognize and respond to security
Zhen Guo, Zhiguang Liu, George Barbastathis, Qihang Zhang, Michael Glinsky, Bradley Alpert, Zachary H. Levine
X-ray tomography is a non-destructive imaging technique that reveals the interior of an object from its projections at different angles. Under limited-angle and low-photon sampling, a regularization prior is required to retrieve a high-fidelity
Mobile applications are pervasive in the public and private sectors. Enterprises in these sectors should evaluate the mobile applications used within their infrastructures for vulnerabilities to minimize potential risk. The SATE VI Mobile track seeks to
Daniel Atherton, Reva Schwartz, Peter Fontana, Patrick Hall
The NIST (National Institute of Standards and Technology) glossary of terms related to trustworthy and responsible artificial intelligence (AI) and machine learning (ML) intends to promote a common understanding and effective communication among
The Weight of Evidence (WoE) is defined to be the logarithm of the Bayes factor (BF) with base 10, which is generally with single point hypothesis rather than diffuse hypothesis. They are used in applications such as forensic science, etc. To statistically
Shelly Bagchi, Patrick Holthaus, Gloria Beraldo, Emmanuel Senft, Daniel Hernandez Garcia, Zhao Han, Suresh Kumaar Jayaraman, Alessandra Rossi, Connor Esterwood, Antonio Andriella, Paul Pridham
In this paper, we present a proposed format for reporting human studies in Human-Robot Interaction (HRI). We specifically call out details which are often overlooked or left out of conference and journal papers due to space constraints, and propose a
Ahmet Okutan, Peter Mell, Medhi Mirakhorli, Igor Khokhlov, Joanna Santos, Danielle Gonzalez, Steven Simmons
Prior research has shown that public vulnerability systems such as US National Vulnerability Database (NVD) rely on a manual, time-consuming, and error-prone process which has led to inconsistencies and delays in releasing final vulnerability results. This
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how
Unobstructed communication between Software Defined Networks (SDN) switches and the controller is vital for SDN's normal operation. We find from measurements, however, that the software control agents on some of the switches have very limited throughput
Recent advances in first principles calculations and machine learning techniques allow a systematic search for phonon-mediated superconductors. We develop a multi-step workflow for the discovery of conventional superconductors, starting with a Bardeen
James McCarthy, Ya-Shian Li-Baboud, Joseph Brule, Karri Meldorf
The national and economic security of the United States (U.S.) is dependent upon the reliable functioning of the nation's critical infrastructure. Positioning, Navigation, and Timing (PNT) services are widely deployed throughout this infrastructure. In a