Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 101 - 125 of 2197

Integrated Sensing and Communication: Enabling Techniques, Applications, Tools and Datasets, Standardization, and Future Directions

December 1, 2022
Author(s)
Jian Wang, Neeraj Varshney, Camillo Gentile, Steve Blandino, Jack Chuang, Nada T. Golmie
The design of integrated sensing and communication (ISAC) systems has drawn recent attention for its capacity to solve a number of challenges. Indeed, ISAC can enable numerous benefits, such as the sharing of spectrum resources, hardware, and software, and

Task Offloading in Multi-tier Computing Systems towards Next-Generation Wireless Networks

December 1, 2022
Author(s)
Kunlun Wang, Jiong Jin, Yang Yang, Arumugam Nallanathan, Chintha Tellambura, Bijan Jabbari, Tao Zhang
With the development of next-generation wireless networks, the Internet of Things (IoT) is evolving towards the intelligent IoT (iIoT), where intelligent applications usually have stringent delay and jitter requirements. In order to provide lowlatency

Voices of First Responders: How to Facilitate Adoption and Usage of Communication Technology - An Integrated Analysis of Qualitative and Quantitative Findings

November 28, 2022
Author(s)
Yee-Yin Choong, Kerrianne Buchanan, Shanee Dawkins, Sandra Spickard Prettyman
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as

Efficient Parameter Exploration of Simulation Studies

November 18, 2022
Author(s)
Megan Olsen, M S Raunak
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of

Guide to a Secure Enterprise Network Landscape

November 17, 2022
Author(s)
Ramaswamy Chandramouli
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered

Using Business Impact Analysis to Inform Risk Prioritization and Response

November 17, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to provide a broad understanding of the potential impacts of any type of loss on the enterprise

Engineering Trustworthy Secure Systems

November 16, 2022
Author(s)
Ronald S. Ross, Mark Winstead, Michael McEvilley
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to

Advanced Persistent Threat Detection using Data Provenance and Metric Learning

November 14, 2022
Author(s)
Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, kangkook Jee
Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they

Intelligent-Fabric Computing: Challenges and Opportunities

November 8, 2022
Author(s)
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
With the advent of the Internet of Everything, people can easily interact with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience of carrying silicon-based entities and a lack of fine-grained

Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting

October 25, 2022
Author(s)
Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sonmez Turan
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: \ascon-128 (primary)

Poisoning Attacks against Machine Learning: Can Machine Learning be Trustworthy?

October 24, 2022
Author(s)
Alina Oprea, Anoop Singhal, Apostol Vassilev
Many practical applications benefit from Machine Learning (ML) and Artificial Intelligence (AI) technologies, but their security needs to be studied in more depth before the methods and algorithms are actually deployed in critical settings. In this article

Privacy policies robustness to reverse engineering

October 21, 2022
Author(s)
A. Gilad Kusne
Differential privacy policies allow one to preserve data privacy while sharing and analyzing data. However, these policies are susceptible to an array of attacks. In particular, often a portion of the data desired to be privacy protected is exposed online

Can You Spot a Phish

October 19, 2022
Author(s)
Shanee Dawkins, Jody Jacobs
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss the NIST Phish Scale, our research on why users click, and how it can help users spot a phish.

AI Assurance for the Public -- Trust but Verify, Continuously

October 3, 2022
Author(s)
Phillip Laplante, D. Richard Kuhn
Artificial intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land vehicles, autonomous aircraft, medical systems and financial systems. AI systems should equal or surpass human performance, but given

The Industrial Ontologies Foundry (IOF) Core Ontology

September 19, 2022
Author(s)
Boonserm Kulvatunyou, Milos Drobnjakovic, Farhad Ameri, Chris Will, Barry Smith
The Industrial Ontologies Foundry (IOF) has been formed to create a suite of interoperable ontologies that would serve as a foundation for data and information interoperability in all areas of manufacturing. To ensure that the ontologies are developed in a

Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight

September 14, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides additional details regarding the enterprise application of
Displaying 101 - 125 of 2197