Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3551 - 3575 of 7109

ITL Publishes Guidance on Preventing and Handling Malware Incidents

August 22, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident

Mechanisms of Cement Hydration

December 22, 2011
Author(s)
Jeffrey W. Bullard, Hamlin M. Jennings, Richard A. Livingston, Andre Nonat, George W. Scherer, Jeffrey S. Schweitzer, Karen L. Scrivener, Jeffrey J. Thomas
Several detailed reviews have been written about the kinetics of cement hydration . In this review, focus is placed on a number of recent advances in understanding the principal mechanisms that govern the rate of hydration and microstructure development

Alarm Information for Decision Support

November 4, 2010
Author(s)
William D. Davis, Adam M. Barowy, Stephen Kerber
Experiments conducted in a Toledo Ohio school are used to examine the use of signals from simulated heat detectors by incident command. Two approaches are examined. The first is to use the signal from ceiling mounted thermocouples to deduce conditions in

Thermochemistry of Ammonium Nitrate, NH4NO3, in the Gas Phase

October 7, 2010
Author(s)
Karl K. Irikura
Hildenbrand and coworkers have shown recently that the vapor above solid ammonium nitrate includes molecules of NH4NO3, not only NH3 and HNO3 as previously believed. Their measurements led to thermochemical values that imply an enthalpy change of D298 = 98

Vulnerability Trends: Measuring Progress

July 19, 2010
Author(s)
David R. Kuhn, Christopher S. Johnson
What is the state of security engineering today? Are we as an industry making progress? What are prospects for the future? To address these questions we analyze data from the National Vulnerability Database (NVD).

Non-GSM Mobile Device Tool Specification

January 7, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

Non-GSM Mobile Device Tool Test Assertions and Test Plan

January 1, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

Pair correlation functions of simple solutes in a Lennard-Jones solvent

November 20, 2008
Author(s)
Yehuda A. Ben Naim, Vincent K. Shen
We have calculated the pair correlation functions for several binary mixtures composed of simple solutes in a Lennard-Jones solvent. In particular, we have studied the solute-solute pair correlation functions and their dependence on the total density, the

Security Considerations in the System Development Life Cycle

October 16, 2008
Author(s)
Richard L. Kissel, Kevin M. Stine, Matthew A. Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on the

BACnetRG Measures Up.

November 1, 2007
Author(s)
Steven T. Bushby
The National Institute of Standards and Technology (NIST) has two campus facilities, the main one in Gaithersburg, MD, near Washington, D.C., and a smaller facility in Boulder, Colo. The Gaithersburg facility is 234 hectares (578 acres) and has more than

PDA Forensic Tools: an Overview and Analysis

August 1, 2004
Author(s)
Richard Ayers, Wayne Jansen
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used

Evaluation of Intelligent Information Access Systems

August 1, 2003
Author(s)
Jean C. Scholtz
This paper discusses traditional evaluations for information access systems and proposes metrics more suited for evaluation of intelligent information access systems.

Energetics of Li Atom Displacements in K1-xLixTa03: First-Principles Calculations

July 1, 2003
Author(s)
S A. Prosandeev, Eric J. Cockayne, Benjamin P. Burton
K 1-xLi xTaO 3 (KLT) solid solutions exhibit a variety of interesting physical phenomena related to large local displacements of Li-ions from ideal perovskite A-site positions. First-principles calculations for KLT supercells were used to investigate these

Optimizing the Fast Rydberg Quantum Gate

April 1, 2003
Author(s)
M S. Safronova, Carl J. Williams, Charles W. Clark
The fast phase gate scheme, in which the qubits are atoms confined in sites of an optical lattice, and gate operations are mediated by excitation of Rydberg states, was proposed by Jaksch et al. Phys. Rev. Lett. 85, 2208 (2000). A potential source of

Initial Model for Fires in the World Trade Center Towers (NISTIR 6879)

May 1, 2002
Author(s)
Ronald G. Rehm, William M. Pitts, Howard R. Baum, D D. Evans, Kuldeep R. Prasad, Kevin B. McGrattan, Glenn P. Forney
Based on preliminary assumptions and analysis, mathematical models have been used to estimate the behavior of the fires in the twin towers of the World Trade Center (WTC) on September 11, 2001. The hijacked-plane collision with each tower produced

Initial Model for Fires in the World Trade Center Towers (NISTIR 6879)

May 1, 2002
Author(s)
Ronald G. Rehm, William M. Pitts, Howard R. Baum, D D. Evans, Kuldeep R. Prasad, Kevin B. McGrattan, Glenn P. Forney
Based on preliminary assumptions and analysis, mathematical models have been used to estimate the behavior of the fires in the twin towers of the World Trade Center (WTC) on September 11, 2001. The hijacked-plane collision with each tower produced

Security Self-Assessment Guide for Information Technology Systems

September 5, 2001
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
This ITL Bulletin summarizes Special Publication (SP) 800-26, Security Self-Assessment Guide for Information Technology Systems. Adequate security of information and the systems that process it is a fundamental management responsibility. Agency officials
Displaying 3551 - 3575 of 7109
Was this page helpful?