Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 30426 - 30450 of 143780

Quantification of Borrelia burgdorferi membrane proteins in human serum: a new concept for detection of bacterial infection

November 17, 2015
Author(s)
Sao F. Cheung, Kyle Anderson, Kenia Benitez, Mark J. Soloski, John N. Aucott, Karen W. Phinney, Illarion Turko
The low abundance of bacterial proteins in human serum upon infection imposes a challenge for the early proteomic detection of bacterial infection. To address this challenge, we propose to take advantage of detecting membrane proteins released from

Time dependence in static measurements of vapor pressure

November 17, 2015
Author(s)
Robert F. Berg
The static method for measuring vapor pressure assumes that the sample is pure and that its temperature is steady and uniform. In practice, the measured pressure may be time dependent due to evaporative cooling after pumping on the sample, transpiration of

Electrodeposition of Al-W-Mn Ternary Alloys from the Lewis Acidic Aluminum Chloride?1-Ethyl-3-methylimidazolium Chloride Ionic Liquid

November 16, 2015
Author(s)
Gery R. Stafford, Tetsuya Tsuda, Yuichi Ikeda, Akihito Imanishi, Shohei Kusumoto, Sudsumu Kuwabata, Charles Hussey
The electrodeposition of non-equilibrium ternary Al-W-Mn alloys was examined in the Lewis acidic 66.7-33.3 mole ratio aluminum chloride–1-ethyl-3-methylimidazolium chloride (AlCl3–[C2mim]Cl) ionic liquid (IL). K3[W2Cl9] and MnCl2 were added to provide

Reduced-scale Experimental Facility to Characterize Firebrand Ignition

November 16, 2015
Author(s)
Samuel L. Manzello, Sayaka Suzuki
Large outdoor fires are a problem in Japan and the USA. In order to prevent losing structures to large outdoor fires, it is important to understand the vulnerabilities of structures to firebrand showers and then, strengthen structures to these exposures

Tailoring Security Controls for Industrial Control Systems

November 16, 2015
Author(s)
Victoria Y. Pillitteri, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-82, Rev 2: Guide to Industrial Control Systems (ICS) Security written by Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams and Adam Hahn. The publication provides

The GenApp Framework Integrated with Airavata for Managed Compute Resource Submissions

November 16, 2015
Author(s)
Emre H. Brookes, Nadeem Anjum, Joseph E. Curtis, Suresh Marru, Raminder Singh, Marlon Pierce
A new framework (GenApp) for rapid generation of scientific applications running on a variety of systems including science gateways has recently been developed . This framework currently builds a GUI and/or web based user interface for a variety of target

A dimensional analysis on firebrand penetration through a mesh screen

November 15, 2015
Author(s)
Jiann C. Yang, Samuel L. Manzello
A dimensional analysis on firebrand penetration through a mesh screen was carried out to provide a framework to correlate a limited set of experimental data previously reported by Manzello et al. (2011). Two dimensionless variables were obtained. The

Measuring and Specifying Combinatorial Coverage of Test Input Configurations

November 14, 2015
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
A key issue in testing is how many tests are needed for a required level of coverage or fault detection. Estimates are often based on error rates in initial testing, or on code coverage. For example, tests may be run until a desired level of statement or

Minimizing Attack Graph Data Structures

November 14, 2015
Author(s)
Peter Mell, Richard Harang
An attack graph is a data structure representing how an attacker can chain together multiple attacks to expand their influence within a network (often in an attempt to reach some set of goal states). Restricting attack graph size is vital for the execution
Displaying 30426 - 30450 of 143780
Was this page helpful?