Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 426 - 450 of 2294

Generating Domain Terminologies using Root- and Rule-Based Terms

December 21, 2018
Author(s)
Talapady N. Bhat, John T. Elliott, Ursula R. Kattner, Carelyn E. Campbell, Eswaran Subrahmanian, Ram D. Sriram, Jacob Collard, Monarch Ira
Motivated by the need for exible, intuitive, reusable, and normalized ter- minology for the semantic web, we present a general approach for generat- ing sets of such terminologies from nat- ural language documents. The terms that this approach generates

Threat Modeling for Cloud Infrastructures

December 21, 2018
Author(s)
Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal
Today's businesses are increasingly relying on the cloud as an alternative IT solution due to its flexibility and lower cost. Compared to traditional enterprise networks, a cloud infrastructure is typically much larger and more complex. Understanding the

Securing Wireless Infusion Pumps

December 19, 2018
Author(s)
Gavin W. O'Brien
This bulletin summarizes the information found in NIST SP 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations which discusses the cybersecurity risks associated with medical devices, such as infusion pumps, which -- in today’s

One Block at a Time Helping to Build Blockchain Knowledge

October 26, 2018
Author(s)
Dylan J. Yaga
This bulletin summarizes the information found in NISTIR 8202: Blockchain Technology overview which provides a high-level technical overview of blockchain technology. It discusses its application to cryptocurrency in depth, but also shows its broader

On Building Fair and Reusable Test Collections using Bandit Techniques

October 17, 2018
Author(s)
Ellen Voorhees
While test collections are a vital piece of the research infrastructure for information retrieval, constructing fair, reusable test collections for large data sets is challenging because of the number of human relevance assessments required. Various

PSCR 2017 Stakeholder Conference Presentation Materials -- Day 3

October 16, 2018
Author(s)
Dereck R. Orr, Richard A. Rouil, Jeremy E. Benson, David W. Griffith, Fidel Liberal, Robert Escalle, Sonim Technologies, Richard Lau, Vencore Labs, Paul Sutton, Software Radio Systems LTD, Sumit Roy, Sean Sangodoyin, David A. Howe, Fabio C. Da Silva, Alicia Evangelista, Yet2, Brienne Engel, Yet2, John S. Garofolo
This document is a compilation of the slides presented during Day 3 of the 2017 Public Safety Communications Research Program's (PSCR) Annual Stakeholder Conference. Day 3 topics include PSCR research plans and results for Mission Critical Voice, Indoor

Circuit designs for superconducting optoelectronic loop neurons

October 12, 2018
Author(s)
Jeffrey M. Shainline, Adam N. McCaughan, Jeffrey T. Chiles, Richard P. Mirin, Sae Woo Nam, Sonia M. Buckley
We present designs of superconducting optoelectronic neurons based on superconducting single- photon detectors, Josephson junctions, semiconductor light sources, and multi-planar dielectric waveguides. The neurons send few-photon signals to synaptic

Blockchain Technology Overview

October 3, 2018
Author(s)
Dylan J. Yaga, Peter M. Mell, Nik Roby, Karen Scarfone
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually without a central authority (i.e., a bank, company, or government). At their basic level, they enable

2017 NIST/ITL Cybersecurity Program: Annual Report

September 18, 2018
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry

Securing Wireless Infusion Pumps in Healthcare Delivery Organizations

August 20, 2018
Author(s)
Gavin W. O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang, Kangmin Zheng
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. However, today’s medical devices connect to a variety of healthcare systems, networks, and other tools within a healthcare

Cybertrust in the IoT Age

July 31, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis
The Internet of Things generates new opportunities but creates new challenges with respect to trustworthiness. Computing, architecture, and verification changes are inevitable to meet these challenges, particularly if predictions of 20 billion to 50

Voices of First Responders - Identifying Public Safety Communication Problems: Findings from User-Centered Interviews, Phase 1, Volume 1

July 31, 2018
Author(s)
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies

User Context: An Explanatory Variable in Phishing Susceptibility

July 15, 2018
Author(s)
Kristen K. Greene, Michelle P. Steves, Mary Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training

In IoT We Trust?

July 13, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Phillip Laplante
In this short article, we review an abbreviated list of trust challenges that we foresee as increased adoption transforms the IoT into another ubiquitous technology just as the Internet is. These challenges are in no specific order, and are by no means a

Towards Managing Age of Network State Information in Challenged Networks

July 8, 2018
Author(s)
Vladimir V. Marbukh
Age of Information (AoI) is a recently introduced metric for freshness of the real-time information, which requires frequent updates. This paper argues that AoI is useful not only for real-time network applications, but also for network state information
Displaying 426 - 450 of 2294
Was this page helpful?