Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 76 - 100 of 115

Report on High Energy Arc Fault Experiments: Experimental Results from Medium Voltage Electrical Enclosures

November 29, 2021
Author(s)
Gabriel Taylor, Anthony D. Putorti Jr., Scott Bareham, Edward Hnetkovsky, Kenneth Hamburger, Nicholas Melly, Mark Henry Salley, Christopher U. Brown, Wai Cheong Tam, Eric Link, Michael Selepak, Philip Deardorff, Kenneth Miller, Paul Clem, Byron Demosthenous, Austin Glover, Chris LaFleur, Raymond Martinez, Anthony Tanbakuchi
This report documents an experimental program designed to investigate High Energy Arcing Fault (HEAF) phenomena for medium voltage electrical switchgear containing aluminum conductors. This report covers full-scale laboratory experiments using

Microbial interactions with silicate glasses

July 17, 2021
Author(s)
Jamie Weaver, Carolyn Pearce, Robert Koestler, Bruce Arey, Albert Kruger, Paula DePriest, Andrew Plymale
Glass alteration in the presence of microorganisms has been a topic of research for over 150 years. Researchers from a variety of disciplines, including material science, biology, chemistry, geology, physics, and cultural heritage materials preservation

Encounter Metrics and Exposure Notification

March 28, 2021
Author(s)
Rene Peralta, Angela Robinson
We discuss the measurement of aggregate levels of encounters in a population, a concept we call encounter metrics. Encounter metrics are designed so that they can be deployed while preserving the privacy of individuals. To this end, encounters are labeled

Foundational PNT Profile: Applying the Cyber Security Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services

February 11, 2021
Author(s)
Jim McCarthy, Karen Reczek, Michael Bartock, Ya-Shian Li-Baboud, Suzanne Lightman, Arthur Scholz, Theresa Suloway, Doug Northrip, Joesph Brule
The national and economic security of the United States (US) is dependent upon the reliable functioning of critical infrastructure. Positioning, Navigation and Timing (PNT) services are widely deployed throughout the critical infrastructure. A disruption

National Institute of Standards and Technology Environmental Scan 2020

February 9, 2021
Author(s)
Heather Evans, Kristen K. Greene, William M. Healy, Elizabeth Hoffman, Kate Rimmer, Anna V. Sberegaeva, Neil M. Zimmerman
The 2020 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the fulfillment of its mission in coming years. The analyses were conducted through four separate lenses

Structural Performance of Nuclear Power Plant Concrete Structures Affected by Alkali-Silica Reaction (ASR) - Task 1: Assessing In-Situ Mechanical Properties of ASR-Affected Concrete

February 8, 2021
Author(s)
Fahim H. Sadek, Travis E. Thonstad, Sorin Marcu, Jonathan Weigand, timothy J. barrett, Hai S. Lew, Long Phan, Adam L. Pintar
This report describes the results of Task 1 of a five-task comprehensive research program being conducted at the National Institute of Standards and Technology (NIST) under the sponsorship of the U.S. Nuclear Regulatory Commission (NRC). The overall study

Structural Performance of Nuclear Power Plant Concrete Structures Affected by Alkali-Silica Reaction (ASR) - Task 2: Assessing Bond and Anchorage of Reinforcing Bars in ASR-Affected Concrete

February 3, 2021
Author(s)
Travis E. Thonstad, Jonathan Weigand, Fahim H. Sadek, Sorin Marcu, timothy J. barrett, Hai S. Lew, Long Phan, Adam L. Pintar
This report describes the results of Task 2 of a five-task comprehensive research program being conducted at the National Institute of Standards and Technology (NIST) under the sponsorship of the U.S. Nuclear Regulatory Commission (NRC). The overall study

Homogenization of Concrete Microstructures in Nuclear Power Plants

December 31, 2020
Author(s)
Christa Torrence, Aishwarya Baranikumar, Zachary Grasley, Edward Garboczi
Nearly all nuclear power plants in the United States are operating past their intended lifetimes or are requesting lifetime extensions, therefore understanding changes to the concrete containment structure over time is crucial to evaluate the structure's

Securing Picture Archiving and Communication System (PACS) Cybersecurity for the Healthcare Sector

December 21, 2020
Author(s)
Jennifer L. Cawthra, Sue S. Wang, Bronwyn J. Hodges, Kangmin Zheng, Ryan T. Williams, Jason J. Kuruvilla, Christopher L. Peloquin, Kevin Littlefield, Bob Neimeyer
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving communication system (PACS) and is nearly ubiquitous in healthcare environments. PACS is defined by the

Object Measurements from 2D Microscopy Images

December 11, 2020
Author(s)
Peter Bajcsy, Joe Chalfoun, Mylene Simon, Mary C. Brady, Marcin Kociolek
This chapter addresses object measurements from 2D microscopy images. Object measurements (called image features) vary in terms of theoretical formulas for the same image feature, the physical units used to represent pixel-based measurements, the

Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

Security Guidelines for Storage Infrastructure

October 26, 2020
Author(s)
Ramaswamy Chandramouli, Doron Pinhas
Storage technology, just like its computing and networking counterparts, has evolved from traditional storage service types, such as block, file, and object. Specifically, the evolution has taken two directions: one along the path of increasing storage

Zero Trust Architecture

August 10, 2020
Author(s)
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and

Charpy Instrumented Test Suite and User's Manual

July 9, 2020
Author(s)
Damian Lauria, Enrico Lucon, Felipe Baldner
The NIST Instrumented Charpy Test Suite is a set of standalone programs intended to allow anyone with appropriate hardware to perform and analyze instrumented Charpy impact tests. The software is provided in both raw code and executable formats with an

Energy Sector Asset Management: For Electric Utilities, Oil & Gas Industry

May 19, 2020
Author(s)
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide
Displaying 76 - 100 of 115
Was this page helpful?