NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The goal of the National Institute of Standards and Technology's (NIST) Public Safety Communications Research (PSCR) program's Usability Team was to provide guidance on the usability of public safety communication technology. Toward that end, the PSCR
The goal of the National Institute of Standards and Technology's (NIST) Public Safety Communications Research (PSCR) program's Usability Team was to provide guidance on the usability of public safety communication technology. Toward that end, the PSCR
The goal of the National Institute of Standards and Technology's (NIST) Public Safety Communications Research (PSCR) program's Usability Team was to provide guidance on the usability of public safety communication technology. Toward that end, the PSCR
The goal of the National Institute of Standards and Technology's (NIST) Public Safety Communications Research (PSCR) program's Usability Team was to provide guidance on the usability of public safety communication technology. Toward that end, the PSCR
As directed by the National Artificial Intelligence Initiative Act of 2020 (P.L. 116-283), the goal of the AI RMF is to offer a resource to the organizations designing, developing, deploying, or using AI systems to help manage the many risks of AI and
Lynn Baumeister, Whitney Quesenbery, Sharon J. Laskowski
Accessible vote by mail (AVBM) provides options for voters with disabilities to complete their absentee or vote by mail ballots independently and privately. AVBM is especially important for voters with print disabilities that make it difficult to read or
This document provides guidance and resources for how to test voting systems against the usability and accessibility requirements in the Voluntary Voting System Guidelines (VVSG) 2.0. The requirements include Principles 2.2 and 5 through 8. The goal of
This publication describes a ballot definition common data format for the interchange of logical and physical ballot style information. It contains a UML (Unified Modeling Language) model of the election data and a JSON (JavaScript Object Notation) and XML
This specification describes a data format for space-constrained environments, such as the placement of machine readable data on paper. The specification is responsive to a need for interoperability in several key voting system scenarios in which the use
Zineb Maasaoui, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, ahmed lbath, Veton KEPUSKA
Real-time traffic management and control have become necessary in today's networks due to their complexity and cybersecurity risks. With the increase in internet use, threats are more present and require real-time detection and analysis to prevent
The pixel is often used as a unit of measurement in information technology. Unfortunately, there is not a simple, consistently-applicable answer to what it is a measure of. This report analyzes the pixel unit through the lens of metrology and shows how one
Sonia Buckley, Alexander Tait, Adam McCaughan, Bhavin Shastri
Neuromorphic systems promise to solve certain problems faster and with higher energy efficiency than traditional computing, by using the physics of the devices themselves for information processing. While initial results in photonic neuromorphic hardware
Industrial users of ISO 10303 STandard for the Exchange of Product Model Data (STEP) protocols needed the ability to exchange design product data that is in conformance with recently updated ISO geometric product specification (GPS) standards, the American
Hamed Ahmadi, Avishek Nag, Zaheer Khan, Kamran Sayrafian, Susanto Rahadrja
Digital twin (DT) is a promising technology for the new immersive digital life with a variety of applications in areas such as Industry 4.0, aviation, and healthcare. Proliferation of this technology requires higher data rates, reliability, resilience, and
Space operations are increasingly important to the national and economic security of the United States. Commercial space's contribution to the critical infrastructure is growing in both volume and diversity of services as illustrated by the increased use
Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu
The past several years have witnessed rapidly increasing use of machine learning (ML) systems in multiple industry sectors. Since risk analysis is one of the most essential parts of the real-world ML system protection practice, there is an urgent need to
Jian Wang, Neeraj Varshney, Camillo Gentile, Steve Blandino, Jack Chuang, Nada T. Golmie
The design of integrated sensing and communication (ISAC) systems has drawn recent attention for its capacity to solve a number of challenges. Indeed, ISAC can enable numerous benefits, such as the sharing of spectrum resources, hardware, and software, and
Kunlun Wang, Jiong Jin, Yang Yang, Arumugam Nallanathan, Chintha Tellambura, Bijan Jabbari, Tao Zhang
With the development of next-generation wireless networks, the Internet of Things (IoT) is evolving towards the intelligent IoT (iIoT), where intelligent applications usually have stringent delay and jitter requirements. In order to provide lowlatency
The COrona VIrus Disease – 2019 (COVID-19) pandemic has had a profound effect on the entire world. With the onset of the pandemic in 2020, also started various efforts around the world to automate the contact tracing process to increase its efficacy. Most
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as
Irena Bojanova, Carlos Eduardo Cardoso Galhardo, Sara Moshtari
In this work, we present an orthogonal classification of data type bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define four language-independent classes that cover all
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of
While the existence of many security elements can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to provide a broad understanding of the potential impacts of any type of loss on the enterprise