Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 6751 - 6775 of 73829

New Practical Multivariate Signatures from a Nonlinear Modifier

April 1, 2021
Author(s)
Daniel Smith-Tone
Multivariate cryptography is dominated by schemes supporting various modifiers to patch certain algebraic weaknesses. Typically these modifiers are linear in nature--- either requiring an extra composition with an affine map, or being evaluated by a

Spectral Analysis of Line Edge and Line Width Roughness using Wavelets

April 1, 2021
Author(s)
Ndubuisi George Orji
Although line edge and line width roughness (LER/LWR) have been key metrology challenges over the last 15 years, the advent of extreme-ultraviolet lithography (EUV) has increased the importance of its measurement and control. Lithographically printed

Substrate-enhanced photothermal nano-imaging of surface polaritons in monolayer graphene

April 1, 2021
Author(s)
Samuel Berweger, Fabian Menges, Honghua Yang, Tao Jiang, Markus B. Raschke
Surface polaritons comprise a wealth of light-matter interactions with deep subwavelength scale confinement of electromagnetic modes. However, their nanoscale localized dissipation and thermalization processes are not readably accessible experimentally

Atividades Fundamentais de Ciberseguranca para Fabricantes de Dispositivos IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os dispositivos da Internet das Coisas (IoT) muitas vezes não possuem recursos de segurança cibernética de acordo com os dispositivos que os seus clientes — organizações e indivíduos — querem usar para ajudar a mitigar riscos de segurança cibernética. Os

ISCMA: An Information Security Continuous Monitoring Program Assessment

March 31, 2021
Author(s)
Victoria Yan Pillitteri, Kelley L. Dempsey, Chad Baer, Ron Rudman, Robert Niemeyer, Susan Urban
This publication describes an example methodology for assessing an organization's Information Security Continuous Monitoring (ISCM) program. It was developed directly from NIST guidance and is applicable to any organization, public or private. It can be

Linha de Base do Nucleo de Recursos de Ciberseguranca de Dispositivos IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os recursos de cibersegurança dos dispositivos são funções que os dispositivos de computação fornecem através dos seus próprios meios técnicos (ex: hardware e software do dispositivo). Esta publicação define uma linha de base dos recursos de cibersegurança

Referencia basica de las capacidades de ciberseguridad de los dispositivos de IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Las capacidades de ciberseguridad de dispositivo son características o funciones de ciberseguridad que los dispositivos informáticos proporcionan por sus propios medios técnicos (es decir, el hardware y el software del dispositivo). Esta publicación define

Summary of the October 2020 Terminology Harmonization Meeting

March 31, 2021
Author(s)
Craig I. Schlenoff
On October 26, 2020, the Industrial Activities Board (IAB) of the IEEE Robotics and Automation Society (RAS) organized a virtual Terminology Harmonization Meeting in conjunction with the Intelligent Robots and Systems (IROS) Conference. The goal of the

A Machine Learning Based Scheme for Dynamic Spectrum Access

March 30, 2021
Author(s)
Anirudha Sahoo
In this paper, we present a machine learning (ML) based dynamic spectrum access (DSA) scheme which can be used in a system in which primary user (PU) spectrum occupancy can be represented as a sequence of busy (on) and idle (off) periods. We use real world

Securing Property Management Systems

March 30, 2021
Author(s)
Bill Newhouse
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management systems, which are central to hotel operations, present attractive attack surfaces. This example

Compound flooding in eastern North Carolina: Understanding stakeholder perceptions and needs

March 29, 2021
Author(s)
Scott Curtis, Jamie Kruse, Anuradha Mukherji, Jennifer Helgeson, Kelley DePolt, Philip Van Wagoner, Ausmita Ghosh
While our scientific understanding of compound flood risk has made great strides in recent years, there is a lack of studies related to stakeholder awareness of the non-linear combination of pluvial, fluvial, and tidal flooding, which often occur in

Consideraciones para la gestion de riesgos a la ciberseguridad y la privacidad de internet de las cosas (IoT)

March 29, 2021
Author(s)
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas organizaciones no se dan cuenta del gran número de dispositivos de IoT que ya están utilizando

Consideracoes para Gerenciar Riscos de Privacidade e Seguranca Cibernetica na Internet das Coisas (IoT)

March 29, 2021
Author(s)
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão necessariamente cientes do grande número de dispositivos IoT que já estão usando e como eles
Displaying 6751 - 6775 of 73829
Was this page helpful?