Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 46 of 46

Exploring Government Security Awareness Programs: A Mixed-Methods Approach

August 3, 2021
Author(s)
Jody Jacobs, Julie Haney, Susanne M. Furman, Fernando Barrientos
Organizational security awareness programs are often underfunded and rely on part-time security awareness professionals who may lack sufficient background, skills, or resources necessary to manage an effective and engaging program. U.S. government

Cybersecurity Advocates: Force Multipliers in Security Behavior Change

July 5, 2021
Author(s)
Julie Haney, Wayne Lutters, Jody Jacobs
Cybersecurity advocates motivate individuals and organizations to adopt positive security behaviors. Based on our research, we describe qualities of successful advocates. Our findings have practical implications for expanding the cybersecurity workforce by

Designing Trojan Detectors in Neural Networks Using Interactive Simulations

February 20, 2021
Author(s)
Peter Bajcsy, Nicholas J. Schaub, Michael P. Majurski
This paper addresses the problem of designing trojan detectors in neural networks (NNs) using interactive simulations. Trojans in NNs are defined as triggers in inputs that cause misclassification of such inputs into a class (or classes) unintended by the

Rethinking Authentication

November 11, 2019
Author(s)
Kim B. Schaffer
In today's environment, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization's

Case Study - Exploring Children's Password Knowledge and Practices

February 23, 2019
Author(s)
Yee-Yin Choong, Mary Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous

Securing Wireless Infusion Pumps

December 19, 2018
Author(s)
Gavin W. O'Brien
This bulletin summarizes the information found in NIST SP 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations which discusses the cybersecurity risks associated with medical devices, such as infusion pumps, which -- in today’s

Securing Wireless Infusion Pumps in Healthcare Delivery Organizations

August 20, 2018
Author(s)
Gavin W. O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang, Kangmin Zheng
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. However, today’s medical devices connect to a variety of healthcare systems, networks, and other tools within a healthcare
Displaying 26 - 46 of 46