Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 751 - 775 of 5421

PSCR 2020_ LMR Data Collection for Traffic Modeling

October 29, 2020
Author(s)
Christopher D. Dennis, Yishen Sun
The Land Mobile Radio (LMR) Data Collection Project creates a database of Public Safety (PS) LMR usage for traffic/call modeling. The generated models are used by telecom providers and PS entities for future technology deployments (e.g., LTE and 5G). This

Large-Signal-Network-Analyzer Round Robin

February 1, 2016
Author(s)
Dylan F. Williams, Paul D. Hale, Catherine A. Remley, Gustavo Avolio, Dominique Schreurs, Diogo C. Ribeiro, Pawel Barmuta, Gian Piero Gibiino, Mohammad Rajabi, Arkadiusz Lewandowski, Jaros?aw Szatkowski, Kuangda Wang
This paper describes tests of the calibration-comparison method as an approach to assessing the measurement accuracy of large-signal network analyzer calibrations. We show that having one trusted reference calibration allows the calibration accuracy of the

Guidelines on Firewalls and Firewall Policy

September 28, 2009
Author(s)
Karen A. Scarfone, Paul Hoffman
Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security

Electronic Authentication Guideline

August 29, 2013
Author(s)
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of

Developing Cyber-Resilient Systems: A Systems Security Engineering Approach

December 8, 2021
Author(s)
Ronald S. Ross, Victoria Yan Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
NIST Special Publication (SP) 800-160, Volume 2, Revision 1, focuses on cyber resiliency engineering—an emerging specialty systems engineering discipline applied in conjunction with systems security engineering and resilience engineering to develop

Developing Cyber Resilient Systems: A Systems Security Engineering Approach

November 27, 2019
Author(s)
Ronald S. Ross, Victoria Y. Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
This publication is used in conjunction with ISO/IEC/IEEE 15288:2015, Systems and software engineering--Systems life cycle processes, NIST Special Publication 800-160, Volume 1, Systems Security Engineering--Considerations for a Multidisciplinary Approach

Voices of First Responders: How to Facilitate Adoption and Usage of Communication Technology - An Integrated Analysis of Qualitative and Quantitative Findings

November 28, 2022
Author(s)
Yee-Yin Choong, Kerrianne Buchanan, Shanee Dawkins, Sandra Spickard Prettyman
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as

Reports of The National Conference on Weights and Measures 1905 - 2019

January 15, 2021
Author(s)
Yvonne Branden
This is a compilation of the meetings of the National Conference on Weights and Measures (NCWM) for the years 1905 to 2019. Reports by the NCWM Board of Directors, Standing Committees, and Special Purpose Committees constitute the major portion of this

Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations

November 1, 2024
Author(s)
Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alex Holbrook, Matthew Fallon
Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These
Displaying 751 - 775 of 5421
Was this page helpful?