Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 5851 - 5875 of 9857

Vulnerability Trends: Measuring Progress

July 19, 2010
Author(s)
David R. Kuhn, Christopher S. Johnson
What is the state of security engineering today? Are we as an industry making progress? What are prospects for the future? To address these questions we analyze data from the National Vulnerability Database (NVD).

Non-GSM Mobile Device Tool Specification

January 7, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

Non-GSM Mobile Device Tool Test Assertions and Test Plan

January 1, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

Pair correlation functions of simple solutes in a Lennard-Jones solvent

November 20, 2008
Author(s)
Yehuda A. Ben Naim, Vincent K. Shen
We have calculated the pair correlation functions for several binary mixtures composed of simple solutes in a Lennard-Jones solvent. In particular, we have studied the solute-solute pair correlation functions and their dependence on the total density, the

Security Considerations in the System Development Life Cycle

October 16, 2008
Author(s)
Richard L. Kissel, Kevin M. Stine, Matthew A. Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on the

BACnetRG Measures Up.

November 1, 2007
Author(s)
Steven T. Bushby
The National Institute of Standards and Technology (NIST) has two campus facilities, the main one in Gaithersburg, MD, near Washington, D.C., and a smaller facility in Boulder, Colo. The Gaithersburg facility is 234 hectares (578 acres) and has more than

PDA Forensic Tools: an Overview and Analysis

August 1, 2004
Author(s)
Richard Ayers, Wayne Jansen
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used

Evaluation of Intelligent Information Access Systems

August 1, 2003
Author(s)
Jean C. Scholtz
This paper discusses traditional evaluations for information access systems and proposes metrics more suited for evaluation of intelligent information access systems.

Energetics of Li Atom Displacements in K1-xLixTa03: First-Principles Calculations

July 1, 2003
Author(s)
S A. Prosandeev, Eric J. Cockayne, Benjamin P. Burton
K 1-xLi xTaO 3 (KLT) solid solutions exhibit a variety of interesting physical phenomena related to large local displacements of Li-ions from ideal perovskite A-site positions. First-principles calculations for KLT supercells were used to investigate these

Initial Model for Fires in the World Trade Center Towers (NISTIR 6879)

May 1, 2002
Author(s)
Ronald G. Rehm, William M. Pitts, Howard R. Baum, D D. Evans, Kuldeep R. Prasad, Kevin B. McGrattan, Glenn P. Forney
Based on preliminary assumptions and analysis, mathematical models have been used to estimate the behavior of the fires in the twin towers of the World Trade Center (WTC) on September 11, 2001. The hijacked-plane collision with each tower produced

Initial Model for Fires in the World Trade Center Towers (NISTIR 6879)

May 1, 2002
Author(s)
Ronald G. Rehm, William M. Pitts, Howard R. Baum, D D. Evans, Kuldeep R. Prasad, Kevin B. McGrattan, Glenn P. Forney
Based on preliminary assumptions and analysis, mathematical models have been used to estimate the behavior of the fires in the twin towers of the World Trade Center (WTC) on September 11, 2001. The hijacked-plane collision with each tower produced

Security Self-Assessment Guide for Information Technology Systems

September 5, 2001
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
This ITL Bulletin summarizes Special Publication (SP) 800-26, Security Self-Assessment Guide for Information Technology Systems. Adequate security of information and the systems that process it is a fundamental management responsibility. Agency officials

Security for Private Branch Exchange Systems

August 1, 2000
Author(s)
David R. Kuhn
This document provides an introduction to security for private branch exchange systems (PBXs). The primary audience is agency system administrators and others responsible for the installation and operation of PBX systems. Major threat classes are explained

Using VRML in Construction Industry Applications

February 1, 2000
Author(s)
Robert R. Lipman, K A. Reed
This paper describes initial research using the Virtual Reality Modeling Language (VRML97) in construction industry applications. The modeling of steel structures and construction equipment as objects for inclusion in construction-site world models was

Extensions of the Single-Integral-Equation Method

July 1, 1999
Author(s)
Egon Marx
Scattering of electromagnetic waves by homogeneous dielectric or finitely conducting bodies can be reduced to the solution of integral equations. In the simpler cases, only a single-integral-equation is needed, with no increase of required memory over

Application of a Large Eddy Simulation Model to Study Room Airflow.

January 1, 1998
Author(s)
Steven J. Emmerich, Kevin B. McGrattan
A three-dimensional, large eddy simulation (LES) model developed for studying the transport of smoke and hot gases during afire in an enclosure is described. The model uses finite digerence techniques to solve the Navier-Stokes equations with an approach
Displaying 5851 - 5875 of 9857
Was this page helpful?