Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1026 - 1050 of 4392

Networks of 'Things'

July 28, 2016
Author(s)
Jeffrey M. Voas
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, five core primitives belonging to most distributed systems are presented. These primitives apply well to

Enabling Interactive Measurements from Large Coverage Microscopy

July 1, 2016
Author(s)
Peter Bajcsy, Antoine Vandecreme, Julien M. Amelot, Mary C. Brady, Joe Chalfoun, Michael P. Majurski
Microscopy could be an important tool for characterizing stem cell products if quantitative measurements could be collected over multiple spatial and temporal scales. With the cells changing states over time and being several orders of magnitude smaller

TRECVid Semantic Indexing of Video: A 6-Year Retrospective

July 1, 2016
Author(s)
George M. Awad, Cees Snoek, Alan Smeaton, Georges Quenot
Semantic indexing, or assigning semantic tags to video samples, is a key component for content-based access to video documents and collections. The Semantic Indexing task has been run at TRECVid from 2010 to 2015 with the support of NIST and the Quaero

Methodology for Increasing Image Feature Measurement Accuracy

June 30, 2016
Author(s)
Michael Paul Majurski, Joe Chalfoun, Steven Lund, Peter Bajcsy, Mary C. Brady
Motivation Image features are computed in cell biology to derive quantitative information regarding cell state, differentiation, biological activity, and cell dynamics. The accuracy of any biological conclusions depends on the accuracy of the measured

Demystifiying the Internet of Things

June 27, 2016
Author(s)
Jeffrey M. Voas
This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

Metamorphic Testing for Cybersecurity

June 27, 2016
Author(s)
Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeff Voas, Zhi Q. Zhou
Testing is a major approach for the detection of software defects, including security vulnerabilities. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct

Summary of the 2015 NIST Language Recognition i-Vector Machine Learning Challenge

June 24, 2016
Author(s)
Audrey N. Tong, Craig S. Greenberg, Alvin F. Martin, Desire Banse, John M. Howard, G R. Doddington, Danilo B. Romero, Douglas A. Reynolds, Lisa Mason, Tina Kohler, Jaime Hernandez-Cordero, Elliot Singer, Alan McCree, Lisa Mason
In 2015 NIST coordinated the first language recognition evaluation (LRE) that used i-vectors as input, with the goals of attracting researchers outside of the speech processing community to tackle the language recognition problem, exploring new ideas in

Derived PIV Application and Data Model Test Guidelines

June 6, 2016
Author(s)
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal

Extending Network Security into Virtualized Infrastructure

June 3, 2016
Author(s)
Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration options

Insights on Formal Methods of Cybersecurity

May 27, 2016
Author(s)
Jeffrey M. Voas, Kim B. Schaffer
We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in formal
Displaying 1026 - 1050 of 4392
Was this page helpful?