Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 251

Considerations for Identity Management in Public Safety Networks

March 30, 2015
Author(s)
Nelson Hastings, Joshua M. Franklin
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their

Public Safety Mobile Application Security Requirements Workshop Summary

January 22, 2015
Author(s)
Michael Ogata, Barbara Guttman, Nelson Hastings
This document captures the input received from the half-day workshop titled "Public Safety Mobile Application Security Requirements" organized by the Association of Public-Safety Communications Officials (APCO) International, in cooperation with FirstNet

The Second National Ballistics Imaging Comparison (NBIC-2)

January 5, 2015
Author(s)
Theodore V. Vorburger, James H. Yen, Jun-Feng Song, Robert M. Thompson, Thomas Brian Renegar, Xiaoyu Alan Zheng, D Ott, Martin G. Ols
In response to the guidelines issued by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB-International) to establish traceability and quality assurance in U.S. crime laboratories, NIST and the ATF initiated a

Hardening Structures to Resist Wildland-Urban (WUI) Fire Exposures

November 14, 2014
Author(s)
Samuel L. Manzello
Wildfires that spread into communities, referred to as Wildland-Urban Interface (WUI) fires, have destroyed communities throughout the world. In the USA, over 46 million homes in 70,000 communities are at risk of WUI fires [1-2]. Historically, fire safety

Release of NIST Interagency Report 7946, CVSS Implementation Guidance

July 10, 2014
Author(s)
Harold Booth, Joshua M. Franklin, Larry Feldman, Greg Witte
The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global

Community Resilience: The Role of the Built Environment

June 27, 2014
Author(s)
Therese P. McAllister
Buildings and infrastructure systems play a key role in communities by supporting social needs and institutions, including housing, business, government, industry, and other vital services. The concept of community resilience addresses the way that

Standoff passive video imaging at 350 GHz with 251 superconducting detectors

June 20, 2014
Author(s)
Daniel T. Becker, James A. Beall, Hsiao-Mei Cho, Gene C. Hilton, Nicholas G. Paulter Jr., Carl D. Reintsema, Robert E. Schwall, Cale Gentry, Ilya Smirnov, Peter Ade, W D. Duncan, Mark Halpern, Carole Tucker
Millimeter wavelength radiation holds promise for detection of security threats at a distance, including suicide bomb belts and maritime threats in poor weather. The high sensitivity of superconducting Transition Edge Sensor (TES) detectors makes them

Experimental Study of Firebrand Transport

June 1, 2014
Author(s)
Samuel L. Manzello, Kuibin Zhou, Sayaka Suzuki
The NIST Firebrand Generator (NIST Dragon) has been used to quantify the vulnerability of structures to ignition by firebrand attack. The Firebrand Generator is also as useful device to study firebrand transport, and has been used to validate firebrand

Exposing Decking Assemblies to Continuous Wind-Driven Firebrand Showers

June 1, 2014
Author(s)
Samuel L. Manzello, Sayaka Suzuki
A series of experiments were conducted to examine potential vulnerabilities of wood decks to continuous, wind-driven firebrand showers. Sections of wood decks (1.2 m by 1.2 m) were constructed and attached to a re-entrant corner assembly. The deck

CVSS Implementation Guidance

April 28, 2014
Author(s)
Joshua M. Franklin, Charles W. Wergin, Harold Booth
This Interagency Report provides guidance to individuals scoring vulnerabilities using the Common Vulnerability Scoring System (CVSS) Version 2.0 scoring metrics. CVSS defines a vulnerability as a bug, flaw, weakness, or exposure of an application, system

The Performance of Essential Facilities in Superstorm Sandy

April 4, 2014
Author(s)
Therese P. McAllister
Superstorm Sandy affected the functionality of a number of essential buildings and facilities in the flooded areas of New York and New Jersey. The flood elevations exceeded design-level floods in many locations, as defined by FIRM maps and codes and

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0

February 12, 2014
Author(s)
Adam Sedgewick
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation

Ambulance Design Survey 2011: A Summary Report

January 15, 2014
Author(s)
Yung-Tsun T. Lee, Deogratias Kibira, Allison Barnard Feeney, Jennifer L. Marshall
Current ambulance designs are ergonomically inefficient and often times unsafe for practical treatment response to medical emergencies. Thus, the patient compartment of a moving ambulance is a hazardous working environment. As a consequence, emergency

Applications of Surface Metrology in Firearm Identification

January 8, 2014
Author(s)
Xiaoyu Alan Zheng, Johannes A. Soons, Theodore V. Vorburger, Jun-Feng Song, Thomas Brian Renegar, Robert M. Thompson
Surface metrology is commonly used to characterize functional engineering surfaces. The technologies developed offer opportunities to improve forensic toolmark identification. Toolmarks are created when a tool comes into contact with a surface and causes

A Simple Means for Reducing the Risk of Progressive Collapse

December 1, 2013
Author(s)
Yihai Bao, Hai S. Lew, Fahim H. Sadek, Joseph Main
A simple debonding technique is proposed to reduce or eliminate strain localization in reinforcing bars in the region of wide flexural cracks in RC beams, and as a result enhance the resistance of RC buildings to disproportionate collapse. In this study

Structural Design for Disaster Resilience

October 28, 2013
Author(s)
Fahim H. Sadek, Joseph Main, John L. Gross, Therese P. McAllister
This paper presents a brief overview of research at the National Institute of Standards and Technology (NIST) on disaster resilience of buildings, infrastructure, and communities, including component programs and projects. NIST's efforts aim at developing

Challenges of the Changing Robot Markets

July 19, 2013
Author(s)
Gurvinder S. Virk, Carol Herman, Roger V. Bostelman, Tamas Haidegger
Service robots are becoming an integrated part of daily life, entering even the most complex scenarios, yet at a slower pace than previously anticipated. This paper presents an overview of the changing area of robotics and the new challenges being faced

Forensic Science Laboratories: Handbook for Facility Planning, Design, Construction, and Relocation.

June 25, 2013
Author(s)
James Aguilar, Tom Barnes, Joseph Browne, Yvette Burney, John Byrd, Bonnie Carver, Adam Denmark, Susan Halla, Lou Hartman, Alison Kennedy, Deborah Leben, Greg Matheson, Jim McClaren, Russell McElroy, Romeo Miranda, Kenneth Mohr, Michael Mount, Steve Sigel, Jennifer Smither, Melissa Taylor, Aliece Watts, Shannan Williams
This handbook is a resource for laboratory directors, designers, consultants, and other stakeholders involved in the construction or major renovation of forensic science laboratories. Laboratory construction and renovation projects must meet the unique

A Generative Model for Fingerprint Minutiae

June 4, 2013
Author(s)
Melissa K. Taylor, Nicholas G. Paulter Jr., Qijun Zhao, Yi Zhang, Anil K. Jain
Fingerprint minutiae are the most important features used by latent fingerprint examiners, as well as in automated fingerprint recognition systems. Hence, understanding the statistical distribution of minutiae is essential in many fingerprint recognition
Displaying 126 - 150 of 251