Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 376 - 400 of 2294

Voices of First RespondersNationwide Public Safety Communication Survey Methodology: Development, Dissemination, and Demographics, Phase 2, Volume 1

March 20, 2020
Author(s)
Kristen Greene, Shanee T. Dawkins, Sandra S. Prettyman, Pamela J. Konkol, Mary F. Theofanos, Kevin C. Mangold, Susanne M. Furman, Michelle P. Steves
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios (LMR) to a technology ecosystem that will include a variety of new communication tools

Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security

March 16, 2020
Author(s)
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Advanced Persistent Threats (APT) has become the concern of many enterprise networks. APT can remain undetected for a long time span and lead to undesirable consequences such as stealing of sensitive data, broken workflow, and so on. To achieve the attack

Passwords Protect My Stuff a Study of Childrens Password Practices

March 10, 2020
Author(s)
Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and

Workshop on Machine Learning for Optical Communication Systems: a summary

March 8, 2020
Author(s)
Joshua A. Gordon, Abdella Battou, Dan Kilper
A summary and overview of a public workshop on machine learning for optical Communication systems held on August 2nd 2019, by the Communications Technology Laboratory at the National Institute of Standards and Technology in Boulder, CO.

Digital Identity Guidelines [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management [includes updates as of 03-02- 2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray Perlner, Andrew Regenscheid, William E. Burr, Justin P. Richer, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Federation and Assertions [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, Justin P. Richer, Sarah K. Squire, James L. Fenton, Ellen M. Nadeau, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Input Space Coverage Matters

January 15, 2020
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei, Dimitris Simos
Testing is the most commonly used approach for software assurance, yet it remains as much judgement and art as science. Structural coverage adds some rigor to the process by establishing formally defined criteria for some notion of test completeness, but

Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation

December 17, 2019
Author(s)
Kotikalapudi Sriram, Douglas C. Montgomery
In recent years, numerous routing control plane anomalies, such as Border Gateway Protocol (BGP) prefix hijacking and route leaks, have resulted in denial-of-service (DoS), unwanted data traffic detours, and performance degradation. Large-scale distributed

Augmenting Fiat Currency with an Integrated Managed Cryptocurrency

November 24, 2019
Author(s)
Peter M. Mell
In this work, we investigate how the governance features of a managed currency (e.g., a fiat currency) can be built into a cryptocurrency in order to leverage potential benefits found in the use of blockchain technology and smart contracts. The resulting

Implementing a Protocol Native Managed Cryptocurrency

November 24, 2019
Author(s)
Peter M. Mell, Aurelien M. Delaitre, Frederic J. de Vaulx, Philippe J. Dessauw
Previous work presented a theoretical model based on the implicit Bitcoin specification for how an entity might issue a cryptocurrency that mimics features of fiat currencies. Novel to this work were mechanisms by which the issuing entity could manage the

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies

November 18, 2019
Author(s)
Wo L. Chang, Nancy Grady
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 1, Definitions

October 21, 2019
Author(s)
Wo L. Chang, Nancy Grady
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. The growth of data is outpacing scientific and technological advances in data analytics. Opportunities exist with Big Data to

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy

October 21, 2019
Author(s)
Wo L. Chang, Arnab Roy, Mark Underwood
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 6, Reference Architecture

October 21, 2019
Author(s)
Wo L. Chang, David Boyd, Orit Levin
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches, and the growth of data is

NIST Big Data Interoperability Framework: Volume 7, Standards Roadmap

October 21, 2019
Author(s)
Wo L. Chang, Russell Reinsch, David Boyd, Carl Buffington
While opportunities exist with Big Data, the data can overwhelm traditional technical approaches. To advance progress in Big Data, the NIST Big Data Public Working Group (NBD-PWG) is working to develop consensus on important, fundamental concepts related

NIST Big Data Interoperability Framework: Volume 9, Adoption and Modernization

October 21, 2019
Author(s)
Wo L. Chang, Russell Reinsch, Claire C. Austin
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of value captured by companies deploying Big Data initiatives has not been equivalent across all

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 - General Implementation Guidance

September 30, 2019
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, Neeraj Shah, Wesley Downard
This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 2 - Process-based Manufacturing System Use Case

September 30, 2019
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, Neeraj Shah, Wesley Downard
This guide provides example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in process-based manufacturing environments to satisfy the requirements in the Cybersecurity
Displaying 376 - 400 of 2294
Was this page helpful?