Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 7126 - 7150 of 73726

Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

Multiscale Microstructure, Composition, and Stability of Surfactant/Polymer Foams

December 8, 2020
Author(s)
Stefania Perticaroli, Jana Herzberger, Yiping Sun, Jonathan D. Nickels, Ryan Murphy, Kathleen Weigandt, Paula J. Ray
Foam stability is a critical part of product performance and consumer experience in materials as diverse as beer or detergents. Inclusion of polymer additives is a known strategy to improve foam stability, but questions persist about the amount of polymer

Symmetry breaking and error correction in open quantum systems

December 8, 2020
Author(s)
Simon K. Lieu, Ron Belyansky, Jeremy T. Young, Rex Lundgren, Victor Albert, Alexey Gorshkov
Symmetry-breaking transitions are a well-understood phenomenon of closed quantum systems in quantum optics, condensed matter, and high energy physics. However, symmetry breaking in open systems is less thoroughly understood, in part due to the richer

Chromosome-scale, haplotype-resolved assembly of human genomes

December 7, 2020
Author(s)
Justin Zook, Shilpa Garg, Heng Li
Haplotype-resolved or phased genome assembly provides a complete picture of genomes and their complex genetic variations. However, current algorithms for phased assembly either do not generate chromosome-scale phasing or require pedigree information, which

Feedback Induced Magnetic Phases in Binary Bose-Einstein Condensates

December 7, 2020
Author(s)
Ian B. Spielman, Shangjie Guo, Hilary M. Hurst
Weak measurement in tandem with real-time feedback control is a new route toward engineering novel non-equilibrium quantum matter. Here we develop a theoretical toolbox for quantum feedback control of multicomponent Bose-Einstein condensates (BECs) using

Smart Home Consumers' Privacy and Security Perceptions & Practices

December 7, 2020
Author(s)
Julie Haney, Susanne M. Furman, Yasemine Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack understanding of the privacy and security implications, while devices fail to provide transparency and

Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems

December 6, 2020
Author(s)
Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier Verbel
In this paper, we show how to significantly improve algebraic techniques for solving the MinRank problem, which is ubiquitous in multivariate and rank metric code based cryptography. In the case of the structured MinRank instances arising in the latter, we

Measurements of the Most Significant Software Security Weaknesses

December 6, 2020
Author(s)
Carlos E. Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye
In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities. The Common Weakness Enumeration (CWE) is a well

Fan-out and Fan-in properties of superconducting neuromorphic circuits

December 4, 2020
Author(s)
Michael Schneider, Segall Kenneth
Neuromorphic computing has the potential to further the success of software-based artificial neural networks (ANNs) by designing hardware from a different perspective. Current research in neuromorphic hardware targets dramatic improvements to ANN

H2 Production in the 10B(n,?)7Li Reaction in Water

December 4, 2020
Author(s)
Alan K. Thompson, Travis C. Dietz, Mohamad Al-Sheikhly, Marcin Sterniczuk, David M. Bartels
We demonstrate a method for measuring the H2 produced in water from the 10B(n,α)7Li fission reaction. Low energy neutrons from the NIST Center for Neutron Research interact with borate- containing water in a temperature-controlled high pressure cell made

Improved coupled-mode theory for high-index-contrast photonic platforms

December 4, 2020
Author(s)
Qing Li, Gregory Moille, Hossein Taheri, Ali Adibi, Kartik Srinivasan
Coupled-mode theory has been widely used in optics and photonics design. Despite its popularity, several different formulations of coupled-mode theory exist in the literature and their applicable range is not entirely clear, in particular when it comes to

Integrative Method to Whole-House Energy and Comfort Rating

December 4, 2020
Author(s)
Hyojin Kim, Han Yan, Anuradha Kadam
The purpose of this research is to investigate how thermal comfort dynamics are impacted by energy-efficient or thermal comfort improvements in a low-load house and to explore methods or metrics to rate a whole-house performance in an integrative way based

Probing Electrified Liquid-Solid Interfaces with Scanning Electron Microscopy

December 2, 2020
Author(s)
Hongxuan Guo, Alexander Yulaev, Evgheni Strelcov, Alexander Tselev, Christopher M. Arble, Andras Vladar, John S. Villarrubia, Andrei Kolmakov
The mean free path of secondary electrons in aqueous solutions is on the order of a nanometer, making them a suitable probe of ultrathin electrical double layers at solid-liquid electrolyte interfaces. Employing graphene as an electron-transparent

Simplify your life

December 2, 2020
Author(s)
Gordon Drake, Eite Tiesinga
Within the Hartree atomic unit systems, the Schrödinger equation becomes parameter free. But there's more to it than making a student's life easier, as Gordon Drake and Eite Tiesinga recount.

An Approach for Detection of Advanced Persistent Threat Attacks

December 1, 2020
Author(s)
Qingtian Zou, Xiaoyan Sun, Peng Liu, Anoop Singhal
Advanced Persistent Threat (APT) campaigns employ sophisticated strategies and tactics to achieve their attack goal. The evolution of APT strategies and tactics compounds the challenge of detecting attack campaigns. This article introduces an approach
Displaying 7126 - 7150 of 73726
Was this page helpful?