NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Network measurement is critical for various network operations and management but has been often constrained by the available resources in the traditional network devices. Recent advances in Software-Defined Networking (SDN) have enabled flexible and
Yi Fan Li, Yang Gao, G Ayoade, L Khan, Anoop Singhal, B Thuraisingham
Under a newly introduced setting of multi stream classification, two data streams are involved, which are referred to as source and target streams. The source stream continuously generates data instances from a certain domain with labels, while the target
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural coverage metrics, it is often difficult to determine if code has been exercised sufficiently to ensure
Zhen Guo, Jungki Song, George Barbastathis, Michael Glinsky, Courtenay Vaughan, Kurt Larson, Bradley Alpert, Zachary H. Levine
X-ray tomography is capable of imaging the interior of objects in three dimensions non-invasively, with applications in biomedical imaging, materials study, electronic inspection, and other fields. The reconstruction process can be an ill-conditioned
Michael Wagner, Manuel Leithner, Dimitris Simos, D. Richard Kuhn, Raghu N. Kacker
CAgen is a state-of-the-art combinatorial test generation tool that is known for its execution speed. In addition, it supports an extensive list of features such as constraint handling, higher-index arrays, and import and export of models/test sets in
Michael Gullans, Alexey Gorshkov, David Huse, Christopher Monroe, Crystal Noel, Pradeep Niroula, Daiwei Zhu, Andrew Risinger, Laird Egan, Debopriyo Biswas, Marko Cetina
Many-body open quantum systems balance internal dynamics against decoherence from interactions with an environment. Here, we explore this balance via random quantum circuits implemented on a trapped-ion quantum computer, where the system evolution is
The growing field of data-driven materials research poses a challenge to educators: teaching machine learning to materials scientists. We share our recent experiences and lessons learnt from organizing educational sessions at the fall 2021 meeting of the
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for the deletion of arbitrary records, thereby preserving hash-based integrity assurance that other
The approved sensitive security parameter generation and establishment methods listed in this publication replace the ones listed in ISO/IEC 19790 Annex D and ISO/IEC 24759 paragraph 6.16, within the context of the Cryptographic Module Validation Program
Emanuel Knill, Scott Glancy, Daniel Cole, Shawn Geller
For many quantum systems intended for information processing, one detects the logical state of a qubit by integrating a continuously observed quantity over time. For example, ion and atom qubits are typically measured by driving a cycling transition and
Matthew Jablonwski, Duminda Wijesekera, Anoop Singhal
We describe a formalized systems theoretic method for creating cyber-physical system (CPS) risk overlays that augment existing tree-based models used in CPS risk and threat analysis processes. This top-down approach objectively scopes the system's threat
Siham Khoussi, N. Alan Heckert, Saddek Bensalem, Abdella Battou
Statistical model checking (SMC) is a formal verification method that combines simulations with statistical techniques to provide quantitative answers on whether a stochastic system satisfies some requirements with a controllable accuracy. SMC takes three
Gretchen Greene, Jared Ragland, Zachary Trautt, June W. Lau, Raymond Plante, Joshua Taillon, Adam Abel Creuziger, Chandler A. Becker, Joe Bennett, Niksa Blonder, Lisa Borsuk, Carelyn E. Campbell, Adam Friss, Lucas Hale, Michael Halter, Robert Hanisch, Gary R. Hardin, Lyle E. Levine, Samantha Maragh, Sierra Miller, Chris Muzny, Marcus William Newrock, John Perkins, Anne L. Plant, Bruce D. Ravel, David J. Ross, John Henry J. Scott, Christopher Szakal, Alessandro Tona, Peter Vallone
Instrumentation generates data faster and in higher quantity than ever before, and interlaboratory research is in historic demand domestically and internationally to stimulate economic innovation. Strategic mission needs of the NIST Material Measurement
Keith A. Stouffer, Joshua Lubell, Michael Pease, Evan K. Wallace
As supply chains become more complex and the origins of products become harder to discern, efforts are emerging that improve traceability of goods by exchanging traceability data records using blockchain and related technologies. This NIST NCCoE
Enterprise patch management is the process of identifying, prioritizing, acquiring, installing, and verifying the installation of patches, updates, and upgrades throughout an organization. Patching is more important than ever because of the increasing
Murugiah Souppaya, Alper Kerman, Karen Scarfone, Kevin Stine, Brian E. Johnson, Chris Peloquin, Vanessa Ruffin, Tyler Diamond, Mark Simos, Sean Sweeney
Despite widespread recognition that patching is effective and attackers regularly exploit unpatched software, many organizations do not adequately patch. There are myriad reasons why, not the least of which are that it's resource-intensive and that the act
Augmented Reality (AR) is an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. AR has potential uses in many fields such as education, retail, repair
charles prado, vinay patil, Raghu N. Kacker, D. Richard Kuhn, M S Raunak
Combinatorial coverage measures have been defined and applied to a wide range of problems. These methods have been developed using measures that depend on the inclusion or absence of t-tuples of values in inputs and test cases. We extend these coverage
Laura Freeman, Feras Batarseh, D. Richard Kuhn, M S Raunak, Raghu N. Kacker
Widescale adoption of intelligent algorithms requires that Artificial Intelligence (AI) engineers provide assurances that an algorithm will perform as intended. Providing such guarantees involves quantifying capabilities and the associated risks across
Reva Schwartz, Apostol Vassilev, Kristen K. Greene, Lori Perine, Andrew Burt, Patrick Hall
As individuals and communities interact in and with an environment that is increasingly virtual they are often vulnerable to the commodification of their digital exhaust. Concepts and behavior that are ambiguous in nature are captured in this environment
Cloud-native applications have evolved into a standardized architecture consisting of multiple loosely coupled components called microservices (often typically implemented as containers) that are supported by an infrastructure for providing application
This document describes the system evaluation tasks supported by the Open Media Forensics Challenge (OpenMFC) 2022. The evaluation plan covers resources, task definitions, task conditions, file formats for system inputs and outputs, evaluation metrics
Demian Riccardi, Zachary Trautt, Ala Bazyleva, Eugene Paulechka, Vladimir Diky, Joe W. Magee, Andrei F. Kazakov, Scott Townsend, Chris Muzny
The ThermoML archive is a subset of Thermodynamics Research Center (TRC) data holdings corresponding to cooperation between NIST TRC and five journals: Journal of Chemical Engineering and Data (ISSN: 0021-9568), The Journal of Chemical Thermodynamics (ISSN