Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 251 - 275 of 2297

Improving quantum state detection with adaptive sequential observations

May 13, 2022
Author(s)
Emanuel Knill, Scott Glancy, Daniel Cole, Shawn Geller
For many quantum systems intended for information processing, one detects the logical state of a qubit by integrating a continuously observed quantity over time. For example, ion and atom qubits are typically measured by driving a cycling transition and

A Roadmap for LIMS at NIST Material Measurement Laboratory

April 11, 2022
Author(s)
Gretchen Greene, Jared Ragland, Zachary Trautt, June W. Lau, Raymond Plante, Joshua Taillon, Adam Abel Creuziger, Chandler A. Becker, Joe Bennett, Niksa Blonder, Lisa Borsuk, Carelyn E. Campbell, Adam Friss, Lucas Hale, Michael Halter, Robert Hanisch, Gary R. Hardin, Lyle E. Levine, Samantha Maragh, Sierra Miller, Chris Muzny, Marcus William Newrock, John Perkins, Anne L. Plant, Bruce D. Ravel, David J. Ross, John Henry J. Scott, Christopher Szakal, Alessandro Tona, Peter Vallone
Instrumentation generates data faster and in higher quantity than ever before, and interlaboratory research is in historic demand domestically and internationally to stimulate economic innovation. Strategic mission needs of the NIST Material Measurement

Improving Enterprise Patching for General IT Systems: Utilizing Existing Tools and Performing Processes in Better Ways

April 6, 2022
Author(s)
Murugiah Souppaya, Alper Kerman, Karen Scarfone, Kevin Stine, Brian E. Johnson, Chris Peloquin, Vanessa Ruffin, Tyler Diamond, Mark Simos, Sean Sweeney
Despite widespread recognition that patching is effective and attackers regularly exploit unpatched software, many organizations do not adequately patch. There are myriad reasons why, not the least of which are that it's resource-intensive and that the act

The Path to Consensus on Artificial Intelligence Assurance

March 15, 2022
Author(s)
Laura Freeman, Feras Batarseh, D. Richard Kuhn, M S Raunak, Raghu N. Kacker
Widescale adoption of intelligent algorithms requires that Artificial Intelligence (AI) engineers provide assurances that an algorithm will perform as intended. Providing such guarantees involves quantifying capabilities and the associated risks across

Towards a Standard for Identifying and Managing Bias in Artificial Intelligence

March 15, 2022
Author(s)
Reva Schwartz, Apostol Vassilev, Kristen K. Greene, Lori Perine, Andrew Burt, Patrick Hall
As individuals and communities interact in and with an environment that is increasingly virtual they are often vulnerable to the commodification of their digital exhaust. Concepts and behavior that are ambiguous in nature are captured in this environment

Open Media Forensics Challenge 2022 Evaluation Plan

March 3, 2022
Author(s)
Haiying Guan, Yooyoung Lee, Lukas Diduch
This document describes the system evaluation tasks supported by the Open Media Forensics Challenge (OpenMFC) 2022. The evaluation plan covers resources, task definitions, task conditions, file formats for system inputs and outputs, evaluation metrics

Towards improved FAIRness of the ThermoML Archive

February 28, 2022
Author(s)
Demian Riccardi, Zachary Trautt, Ala Bazyleva, Eugene Paulechka, Vladimir Diky, Joe W. Magee, Andrei F. Kazakov, Scott Townsend, Chris Muzny
The ThermoML archive is a subset of Thermodynamics Research Center (TRC) data holdings corresponding to cooperation between NIST TRC and five journals: Journal of Chemical Engineering and Data (ISSN: 0021-9568), The Journal of Chemical Thermodynamics (ISSN

Coalition and Threshold Hash-Based Signatures

February 25, 2022
Author(s)
John M. Kelsey, Stefan Lucks
We show how to construct a threshold version of stateful hash-based signature schemes like those defined in XMSS (defined in RFC8391) and LMS (defined in RFC8554). Our techniques assume a trusted dealer and secure point-to-point communications; are

Smart Cities and Communities: A Key Performance Indicators Framework

February 24, 2022
Author(s)
Martin Serrano, Edward Griffor, David A. Wollman, Michael Dunaway, Martin Burns, Sokwoo Rhee, Chris Greer
This publication presents research findings and scientific work that advance the development and progression of smart city and community measurement methodology. The term 'smart,' as used in the phrase 'smart cities,' is defined here as the efficient use

Ransomware Risk Management: A Cybersecurity Framework Profile

February 23, 2022
Author(s)
Bill Fisher, Murugiah Souppaya, William Barker, Karen Scarfone
Ransomware is a type of malicious attack where attackers encrypt an organization's data and demand payment to restore access. In some instances, attackers may also steal an organization's information and demand an additional payment in return for not

Recommended Criteria for Cybersecurity Labeling of Consumer Software

February 4, 2022
Author(s)
Michael Ogata, Amy Phelps, Julie Haney
Executive Order (EO) 14028, "Improving the Nation's Cybersecurity," tasks the National Institute of Standards and Technology (NIST), in coordination with the Federal Trade Commission (FTC) and other agencies, to initiate pilot programs for cybersecurity
Displaying 251 - 275 of 2297
Was this page helpful?