Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3001 - 3025 of 5422

Wildfire Prevention Efficacy: Marginal and Non-marginal Benefit-Cost Ratios

February 1, 2010
Author(s)
Jeffrey P. Prestemon, David Butry, Karen L. Abt, Rhonda Sutphen
Fire prevention education efforts involve a variety of methods intended to reduce the number of accidentally ignited wildfires, including public service announcements, distributing brochures and making presentations. A Poisson model of Florida fire

Cybersecurity Fundamentals for Small Business Owners

November 19, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address

Ground Truth Data Using 3D Imaging for Urban Search and Rescue Robots

October 14, 2009
Author(s)
Nicholas A. Scott, Alan M. Lytle
The National Institute of Standards and Technology (NIST) is leading an effort to develop performance standards for ur- ban search and rescue robots (US&R). An important com- ponent of developing performance standards for these robots is capturing ground

Development of Soft Armor Conditioning Protocols for NIJ 0101.06: Analytical Results

September 24, 2009
Author(s)
Amanda L. Forster, Kirk D. Rice, Michael A. Riley, Guillaume Messin, Sylvain H. Petit, Cyril Clerici, Gale A. Holmes, Joannie W. Chin
This publication details the four major phases of analytical development work, coupled with several additional side studies, undertaken by the Office of Law Enforcement Standards in writing the Flexible Armor Conditioning Protocol in NIJ 0101.06. This

SAMATE's Contribution to Information Assurance

September 1, 2006
Author(s)
Paul E. Black
The amount of software in today's information world is far too large to check manually. Automated tools are a must. These tools can help design and build the right software in the first place, but they can also help if the system being designed includes

BACnet Wide Area Network Security Threat Assessment

July 1, 2003
Author(s)
David G. Holmberg
This technical report addresses inter-networked building automation and control systems (BAS or BCS) using the BACnet protocol [ANSI/ASHRAE, 2001]. The report deals with threats from known sources due to communication connections to the corporate LAN and

BACnet Wide Area Network Security Threat Assessment.

July 1, 2003
Author(s)
David G. Holmberg
This technical report addresses inter-networked building automation and control systems (BAS or BCS) using the BACnet protocol [ANSI/ASHRAE, 2001]. The report deals with threats from known sources due to communication connections to the corporate LAN and

Government Agencies Technology Exchange in Manufacturing (GATE-M)

January 1, 2003
Author(s)
David C. Stieren
This report documents the activities of the Government Agencies Technology Exchange in Manufacturing (GATE-M) from February 2001 to January 2003. This is the period of time from the initial conception of GATE-M to the implementation of the GATE-M Charter

Radio-Frequency Technology Division: Programs, Activities, and Accomplishments

January 1, 2002
Author(s)
Robert M. Judish, Dennis S. Friday
This book describes the programs in the Radio-Frequency Technology Division, of the National Institute of Standards and Technology. The Radio-Frequency Technology Division is a critical national resource for a wide range of customers. U. S. industry is the

Report on the Development of the Advanced Encryption Standard (AES)

June 1, 2001
Author(s)
James R. Nechvatal, Elaine B. Barker, Lawrence E. Bassham, William E. Burr, Morris J. Dworkin, James Foti, E Roback
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibilities. In

Overview of the Federal Technical Standards Conference

January 1, 1999
Author(s)
K J. Leuteritz
This past August 4-6 the first Federal Technical Standards Workshop was held in Washington, DC. The theme was Standards Management A World of Change and Opportunities. The purpose if the conference was to further the implementation of the National

Computer Security: Selected Articles

April 1, 1991
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
… sources, and abstracts of important computer security publications that were relevant to the council's interests. …

Guideline for the Analysis of Local Area Network Security

November 9, 1994
Author(s)
National Institute of Standards and Technology (NIST), Lisa Carnahan, Shu-jen H. Chang
[Withdrawn October 19, 2015] This guideline discusses threats and vulnerabilities and considers technical security services and security mechanisms.

Periodic Table of the Elements

October 5, 2022
Author(s)
Karen Olsen
The periodic table contains NIST's latest critically evaluated data for atomic properties of the elements.

Recertification of the SRM 1483a, a Polyethylene

October 12, 2021
Author(s)
Kathleen M. Flynn, William R. Blair
The recertification of a narrow molecular weight distribution poly(ethylene) Standard Reference Material, SRM 1483a, is described. Studies by size exclusion chromatography to obtain the bottle-to-bottle homogeneity are described. The intrinsic viscosity at
Displaying 3001 - 3025 of 5422
Was this page helpful?