Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 176

Securing Picture Archiving and Communication System (PACS) Cybersecurity for the Healthcare Sector

December 21, 2020
Author(s)
Jennifer L. Cawthra, Sue S. Wang, Bronwyn J. Hodges, Kangmin Zheng, Ryan T. Williams, Jason J. Kuruvilla, Christopher L. Peloquin, Kevin Littlefield, Bob Neimeyer
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving communication system (PACS) and is nearly ubiquitous in healthcare environments. PACS is defined by the

Object Measurements from 2D Microscopy Images

December 11, 2020
Author(s)
Peter Bajcsy, Joe Chalfoun, Mylene Simon, Mary C. Brady, Marcin Kociolek
This chapter addresses object measurements from 2D microscopy images. Object measurements (called image features) vary in terms of theoretical formulas for the same image feature, the physical units used to represent pixel-based measurements, the

Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

Security Guidelines for Storage Infrastructure

October 26, 2020
Author(s)
Ramaswamy Chandramouli, Doron Pinhas
Storage technology, just like its computing and networking counterparts, has evolved from traditional storage service types, such as block, file, and object. Specifically, the evolution has taken two directions: one along the path of increasing storage

Zero Trust Architecture

August 10, 2020
Author(s)
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and

Charpy Instrumented Test Suite and User's Manual

July 9, 2020
Author(s)
Damian Lauria, Enrico Lucon, Felipe Baldner
The NIST Instrumented Charpy Test Suite is a set of standalone programs intended to allow anyone with appropriate hardware to perform and analyze instrumented Charpy impact tests. The software is provided in both raw code and executable formats with an

Energy Sector Asset Management: For Electric Utilities, Oil & Gas Industry

May 19, 2020
Author(s)
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide

DESIGN OF AN INTELLIGENT PYTHON CODE FOR VALIDATING CRACK GROWTH EXPONENT BY MONITORING A CRACK OF ZIG-ZAG SHAPE IN A CRACKED PIPE

July 27, 2019
Author(s)
Jeffrey T. Fong, Pedro V. Marcal, Robert B. Rainsberger, Nathanael A. Heckert, James J. Filliben
When a small crack is detected in a pressure vessel or piping, we can estimate the fatigue life of the vessel or piping by applying the classical law of fracture mechanics for crack growth if we are certain that the crack growth exponent is correct and the

Building Open Access to Research (OAR) data infrastructure at NIST

July 8, 2019
Author(s)
Gretchen R. Greene
As a National Metrology Institute (NMI), the National Institute of Science and Technology (NIST) scientists, engineers and technology experts conduct research across a full spectrum of physical science domains. This is performed as a public service within
Displaying 126 - 150 of 176