Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 14 of 14

Designing Trojan Detectors in Neural Networks Using Interactive Simulations

February 20, 2021
Author(s)
Peter Bajcsy, Nicholas J. Schaub, Michael P. Majurski
This paper addresses the problem of designing trojan detectors in neural networks (NNs) using interactive simulations. Trojans in NNs are defined as triggers in inputs that cause misclassification of such inputs into a class (or classes) unintended by the

Workforce Framework for Cybersecurity (NICE Framework)

November 16, 2020
Author(s)
Rodney J. Petersen, Danielle R. Santos, Karen A. Wetzel, Matthew Smith, Gregory A. Witte
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses

Rethinking Authentication

November 11, 2019
Author(s)
Kim B. Schaffer
In today's environment, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization's

Motivating Cybersecurity Advocates: Implications for Recruitment and Retention

June 20, 2019
Author(s)
Julie M. Haney, Wayne Lutters
Given modern society’s dependence on technological infrastructure vulnerable to cyber-attacks, the need to expedite cybersecurity adoption is paramount. Cybersecurity advocates are critical for promoting, educating, and facilitating the uptake of security

Case Study – Exploring Children’s Password Knowledge and Practices

February 24, 2019
Author(s)
Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous

Securing Wireless Infusion Pumps

December 19, 2018
Author(s)
Gavin W. O'Brien
This bulletin summarizes the information found in NIST SP 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations which discusses the cybersecurity risks associated with medical devices, such as infusion pumps, which -- in today’s

Securing Wireless Infusion Pumps in Healthcare Delivery Organizations

August 20, 2018
Author(s)
Gavin W. O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang, Kangmin Zheng
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. However, today’s medical devices connect to a variety of healthcare systems, networks, and other tools within a healthcare
Displaying 1 - 14 of 14