Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1151 - 1175 of 2282

Introduction: Cybersecurity

August 31, 2010
Author(s)
David R. Kuhn
Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secure

Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.0

July 27, 2010
Author(s)
Stephen D. Quinn, Karen A. Scarfone, Matthew P. Barrett, Christopher S. Johnson
The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. It

Towards Evolutionary-Pricing Framework for Mobile Sensor Network Self-organization

July 18, 2010
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper reports on work in progress on developing a unified co-evolutionary/pricing framework for Mobile Sensor Networks (MSN) self-organization. MSN self-organization involves cooperative sensor positioning and formation of a multi-hop Mobile Ad-hoc

Measuring Security Risk of Networks Using Attack Graphs

July 14, 2010
Author(s)
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately

Investigating the Bag-of-Words Method for 3D Shape Retrieval

June 30, 2010
Author(s)
Afzal A. Godil, Xiaolan Li
This paper investigates the capabilities of the Bag-of-Words (BW) method in the 3D shape retrieval field. The contributions of this paper are: 1) the 3D shape retrieval task is categorized from different points of view: specific vs. generic, partial-to

Optimal Target Tracking Strategy with Controlled Node Mobility in Mobile Sensor Networks

June 30, 2010
Author(s)
Kamran Sayrafian, Vladimir V. Marbukh, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target tracking using a network of collaborative sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of prescribed

Complex Systems Collected Images of the Month March 2008 - June 2010

June 16, 2010
Author(s)
Sanford P. Ressler
This document is a collection of twenty eight Complex Systems Image of the Month (IOM) illustrations. Each month as part of the Complex Systems Program in the Information Technology Laboratory an IOM is produced, posted to the Complex Systems web site and

Statistical Modeling of Harvestable Kinetic Energy for Wearable Medical Sensors

June 15, 2010
Author(s)
Nathalie Yarkony, Kamran Sayrafian, Antonio Possolo
Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable

State of Security Readiness

June 10, 2010
Author(s)
Ramaswamy Chandramouli, Peter M. Mell
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. However, the

Blog Track Research at TREC

June 1, 2010
Author(s)
Ian M. Soboroff, Craig Macdonald, Rodrygo Santos, Iadh Ounis
The TREC Blog track aims to explore information seeking behaviour in the blogosphere, by building reusable test collections for blog-related search tasks. Since, its advent in TREC 2006, the Blog track has led to much research in this growing field, and
Displaying 1151 - 1175 of 2282
Was this page helpful?