NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to
Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, kangkook Jee
Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
With the advent of the Internet of Everything, people can easily interact with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience of carrying silicon-based entities and a lack of fine-grained
Kids are engaged in technology and online activities at younger ages than ever before. They are the "digital natives" – an always online and connected generation. Much cyber security research has focused on adults' perceptions and practices. But, what
Many practical applications benefit from Machine Learning (ML) and Artificial Intelligence (AI) technologies, but their security needs to be studied in more depth before the methods and algorithms are actually deployed in critical settings. In this article
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: \ascon-128 (primary)
Differential privacy policies allow one to preserve data privacy while sharing and analyzing data. However, these policies are susceptible to an array of attacks. In particular, often a portion of the data desired to be privacy protected is exposed online
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss the NIST Phish Scale, our research on why users click, and how it can help users spot a phish.
Artificial intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land vehicles, autonomous aircraft, medical systems and financial systems. AI systems should equal or surpass human performance, but given
Johannes Schulz, William Z. Bernstein, Rafael Radkowski
As industrial internet of things (IoT) concepts and technologies continue to be retro-fitted onto existing manufacturing infrastructure, geospatial considerations, such as asset localization, registration, and tracking, become more critical to ensure
In 2021, the National Institute of Standards and Technology (NIST), in cooperation with the Intelligence Advanced Research Project Activity (IARPA), conducted OpenASR21, the second cycle of an open challenge series of automatic speech recognition (ASR)
Boonserm Kulvatunyou, Milos Drobnjakovic, Farhad Ameri, Chris Will, Barry Smith
The Industrial Ontologies Foundry (IOF) has been formed to create a suite of interoperable ontologies that would serve as a foundation for data and information interoperability in all areas of manufacturing. To ensure that the ontologies are developed in a
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides additional details regarding the enterprise application of
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to the preservation of digital evidence. This document is part of a series on evidence management
Min Chen, Hamid Gharavi, LIN WANG, VICTOR.C.M LEUNG, Zhongchun Liu, Iztok Humar
Case studies on AI-aided emotion care and mental disorder patient monitoring can contribute to providing knowledge and research direction for scholars. Well-studied and persuasive case studies help professionals and the public to fully accept changes and
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic
Adele Peskin, Joe Chalfoun, Michael Halter, Anne Plant
In order to predict cell population behavior, it is important to understand the dynamic characteristics of individual cells. Individual induced pluripotent stem (iPS) cells in colonies have been difficult to track over long times, both because segmentation
This paper overviews a dyadic study of youth knowledge and understandings of online privacy and risk, and then highlights challenges that the study reveals about youth online risk taking and privacy protective measures from a family perspective. A full
This document describes potential use-cases for data interoperability in election technology components not previously considered in past efforts. Such components include on-demand ballot printing systems, remote ballot marking systems and electronic poll
There is currently no common data format for ballot styles and associated use-cases. This white paper investigates this and other potential interoperability gaps within the voting system in a holistic manner, by considering previous voting interoperability
In the fast-evolving world of Cybersecurity, an analyst often has the difficult task of responding to new threats and attack campaigns within a limited amount of time. If an analyst fails to do so, this can lead to severe consequences for the system under
Rezvaneh Rezapour, Sravana Reddy, Rosie Jones, Ian Soboroff
Abstractive summarization of podcasts is motivated by the growing popularity of podcasts and the needs of their listeners. Podcasting is a markedly different domain from news and other media that are commonly studied in the context of automatic
Pete Hopkins, Manuel Castellanos Beltran, John Biesecker, Paul Dresselhaus, Anna Fox, Logan Howe, David Olaya, Adam Sirois, Dylan Williams, Samuel P. Benz, Alirio De Jesus Soares Boaventura, Justus Brevik
Global investment in the research and development of quantum information systems by industry, government, and academic institutions continues to accelerate and is expected to reach over $16B by 2027 [1]. Systems based on optical photons, atoms or ions
This document provides a new Incident Handling framework dedicated to Operational Technology. This framework expands the traditional technical steps by giving an Incident Response procedure based on the event escalation and provides techniques for OT