Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 2130

De-Identifying Government Datasets: Techniques and Governance

September 14, 2023
Simson Garfinkel, Joseph Near, Aref Dajani, Phyllis Singer, Barbara Guttman
De-identification is a general term for any process of removing the association between a set of identifying data and the data subject. This document describes the use of deidentification with the goal of preventing or limiting disclosure risks to

Understanding Stablecoin Technology and Related Security Considerations

September 5, 2023
Peter Mell, Dylan Yaga
Stablecoins are cryptocurrencies whose price is pegged to that of another asset (typically one with low price volatility). The market for stablecoins has grown tremendously – up to almost $200 billion USD in 2022. These coins are being used extensively in

National Institute of Standards and Technology Environmental Scan 2023: Societal and Technology Landscape to Inform Science and Technology Research

August 23, 2023
Ashley Boggs-Russell, Kerrianne Buchanan, David W. Griffith, Heather Evans, Dimitrios Meritis, Lisa Ng, Anna Sberegaeva, Michelle Stephens
The 2023 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the fulfillment of its mission in coming years. The analyses were conducted through three separate lenses

An Infrastructure for Curating, Querying, and Augmenting Document Data: COVID-19 Case Study

August 8, 2023
Eswaran Subrahmanian, Guillaume Sousa Amaral, Talapady N. Bhat, Mary C. Brady, Kevin G. Brady, Jacob Collard, Sarra Chouder, Philippe Dessauw, Alden A. Dima, John T. Elliott, Walid Keyrouz, Nicolas Lelouche, Benjamin Long, Rachael Sexton, Ram D. Sriram
With the advent of the COVID-19 pandemic, there was the hope that data science approaches could help discover means for understanding, mitigating, and treating the disease. This manifested itself in the creation of the COVID-19 Open Research Dataset (CORD

How to Scale a Phish: An Investigation into the Use of the NIST Phish Scale

August 7, 2023
Shanee Dawkins, Jody Jacobs
Organizations around the world are using the NIST Phish Scale (NPS) in their phishing awareness training programs. As a new metric for measuring human phish-ing detection difficulty of phishing emails, the use of the NPS by phishing training implementers

Peering into the Phish Bowl: An Analysis of Real-World Phishing Cues

August 7, 2023
Lorenzo Neil, Shanee Dawkins, Jody Jacobs, Julia Sharp
Organizations use simulated phishing awareness train-ing exercises to help users identify, detect, and defend against the ever-changing phishing threat landscape. Realistic phishing emails are used to test users' ability to spot a phish from visible cues

Critical Software Security Weaknesses

August 1, 2023
Assane Gueye, Carlos Eduardo Cardoso Galhardo, Irena Bojanova
In this work, we append our historical study on the most significant software security weaknesses, re-evaluate our findings, and look closely at the Injection and Memory Corruption/Disclosure weaknesses through the NIST Bugs Framework (BF) lenses. Our goal

CMVP Approved Security Functions

July 25, 2023
Alexander Calis
The approved security functions listed in this publication replace the ones listed in International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 19790 Annex C and ISO/IEC 24759 6.15, within the context of the

Introduction to Cybersecurity for Commercial Satellite Operations

July 25, 2023
Matthew Scholl, Theresa Suloway
Space is a newly emerging commercial critical infrastructure sector that is no longer the domain of only national government authorities. Space is an inherently risky environment in which to operate, so cybersecurity risks involving commercial space –

Enabling FAIR Data in Additive Manufacturing to Accelerate Industrialization

July 24, 2023
Shengyen Li, Yan Lu, Kareem Aggour, Peter Coutts, Brennan Harris, Alex Kitt, Afina Lupulescu, Luke Mohr, Mike Vasquez
Additive manufacturing (AM) is an important enabler of Industry 4.0 but there are several hurdles that need to be overcome to fully realize the potential of AM. These challenges include the need for a data infrastructure to enable the scaling of the

Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)

July 20, 2023
Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Dan Brodjieski, Allen Golbig, Karen Scarfone, Blair Heiserman
The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and assess macOS desktop and laptop system

Artificial Intelligence-Assisted Edge Computing for Wide Area Monitoring

July 7, 2023
Bin Hu, Hamid Gharavi
The massive digital information generated in conjunction with the ever-increasing phasor measurement data in the power grid has led to a tremendous constraint on the analysis and timely processing of real-time data. Under these conditions, leveraging

Security Analysis of Trust on the Controller in the Matter Protocol

June 11, 2023
Anoop Singhal, Shaswat Kumar, Francis Ha, Ximming Ou
Matter is an open-source connectivity standard for the purpose of allowing smart home IoT devices from different vendors to interoperate with one another. A controller in a Matter system commissions new devices into the Matter fabric. The device needs to
Displaying 1 - 25 of 2130