Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3601 - 3625 of 7110

Cryptographic Standards in a Post-Quantum Era

November 2, 2022
Author(s)
Dustin Moody, Angela Robinson
If large-scale quantum computers are ever built, they will compromise the security of many commonly used cryptographic algorithms. In response, the National Institute of Standards and Technology is in the process of standardizing new cryptographic

Standard Reference Materials for Medical CT

June 27, 2013
Author(s)
Zachary H. Levine, Huaiyu H. Chen-Mayer, Adam L. Pintar, Daniel S. Sawyer
NIST Standard Reference Materials 2087 and 2088 for medical computed tomography (CT) have become available. The materials allow CT reconstructions to be tied to the International System of Units in length, density, and mass attenuation coefficient.

The NIST/EPA/NIH mass spectral database: simultaneous control of quality and quantity

June 1, 1997
Author(s)
S G. Lias, Anzor I. Mikaia, O D. Sparkman, Stephen Stein, Vladimir G. Zaikin
Achievements in the development of the NIST/EPA/NIH mass spectral library is reported. Statistical data on the content of the library is presented,the quality control procedures are described, the roles of computer methods and manual procedures in data

Accurate and Robust Trypan Blue-Based Cell Viability Measurement Using Neural Networks

July 19, 2021
Author(s)
Adele Peskin, Steven Lund, Chenyi Ling, Laura Pierce, Sumona Sarkar, Firdavs Kurbanov, Michael Halter, Joe Chalfoun, John T. Elliott
Trypan blue dye exclusion-based cell viability measurements are highly dependent upon image quality and consistency. In order to make measurements repeatable, one must be able to reliably capture images at a consistent focal plane, and with signal-to-noise

Measurements of the Most Significant Software Security Weaknesses

December 6, 2020
Author(s)
Carlos E. Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye
In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities. The Common Weakness Enumeration (CWE) is a well

Reasoning about Smart City

July 31, 2018
Author(s)
Edward R. Griffor, Martin J. Burns, David A. Wollman, Marcello Balducinni, Claire Vishik, Michael Huth
… 4th IEEE Conference on Smart Computing

Security Ontologies for Modeling Enterprise Level Risk Assessment

December 7, 2012
Author(s)
Anoop Singhal, Samuel Singapogu
A unified formal knowledge model of information security domain is essential to support a risk management approach. IT Applications are increasingly exposed to a variety of information security threats. Often wrong decisions are made due to insufficient

Source-Assisted Direction Estimation Inside Buildings

April 11, 2006
Author(s)
Kamran Sayrafian, D Kaspar
Source direction estimation inside building is a difficult and challenging task due to severe multipath signal propagation. Numerous algorithms and techniques exist that provide high-resolution direction estimation under certain conditions and channel
Displaying 3601 - 3625 of 7110
Was this page helpful?