Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 601 - 625 of 4390

NIST Big Data Interoperability Framework: Volume 9, Adoption and Modernization

October 21, 2019
Author(s)
Wo L. Chang, Russell Reinsch, Claire C. Austin
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of value captured by companies deploying Big Data initiatives has not been equivalent across all

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 - General Implementation Guidance

September 30, 2019
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, Neeraj Shah, Wesley Downard
This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 2 - Process-based Manufacturing System Use Case

September 30, 2019
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, Neeraj Shah, Wesley Downard
This guide provides example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in process-based manufacturing environments to satisfy the requirements in the Cybersecurity

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 3 - Discrete-based Manufacturing System Use Case

September 30, 2019
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, Neeraj Shah, Wesley Downard
This guide provides example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in discrete-based manufacturing environments to satisfy the requirements in the Cybersecurity

Securing, Authenticating, and Visualizing Data-Links for Manufacturing Enterprises

August 26, 2019
Author(s)
William Z. Bernstein, Sylvere Krima, Laetitia Monnier, Mehdi Shahid
We introduce a prototype implementation of the Securing and Authenticating Data-Links (SADL) Interface, which interacts with a manufacturing handle registry to facilitate traceability of digital resources for engineering projects. This paper outlines the

The Evolution of Cranfield

August 14, 2019
Author(s)
Ellen M. Voorhees
This chapter examines how the test collection paradigm, the dominant evaluation methodology in information retrieval, has been adapted to meet the changing requirements for information retrieval research in the era of community evaluation conferences such

Determining Forensic Data Requirements for Detecting Hypervisor Attacks

August 7, 2019
Author(s)
Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera
Hardware/Server virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system resources. Server virtualization is typically performed by a hypervisor, which

Security Strategies for Microservices-based Application Systems

August 7, 2019
Author(s)
Ramaswamy Chandramouli
Microservices architecture is increasingly being used to develop application systems since its smaller codebase facilitates faster code development, testing, and deployment as well as optimization of the platform based on the type of microservice, support

2018 MediFor Challenge

July 23, 2019
Author(s)
Jonathan G. Fiscus, Haiying Guan, Andrew Delgado, Timothee N. Kheyrkhah, Yooyoung Lee, Daniel F. Zhou, Amy Yates
Media forensics is the science and practice of determining the authenticity and establishing the integrity of audio and visual media. DARPA's Media Forensics (MediFor) program brings together world-class researchers to develop technologies for the
Displaying 601 - 625 of 4390
Was this page helpful?