Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51 - 75 of 1983

FPGA Implementation of a Low Latency and High SFDR Direct Digital Synthesizer for Resource-Efficient Quantum-Enhanced Communication

October 15, 2020
Author(s)
FNU Nur Fajar Rizqi Annafianto, Jabir Marakkarakath Vadakkepurayil, Ivan Burenkov, Hasan Urgurdag, Abdella Battou, Sergey Polyakov
In most modulation schemes for a telecommunication system, a fast and efficient sinusoidal signal generator is needed. Here we report on an FPGA implementation of a versatile CORDIC Based Direct Digital Synthesizer (DDS). Most commercial lightwave

Data Integrity Recovering from Ransomware and Other Destructive Events

September 22, 2020
Author(s)
Anne R. Townsend, Timothy J. McBride, Lauren N. Lusty, Julian T. Sexton, Michael R. Ekstrom
Businesses face a near-constant threat of destructive malware, ransomware, malicious insider activities, and even honest mistakes that can alter or destroy critical data. These data corruption events could cause a significant loss to a company’s reputation

Cryptanalysis of LEDAcrypt

September 16, 2020
Author(s)
Daniel C. Apon, Ray A. Perlner, Angela Y. Robinson, Paulo Santini
We report on the concrete cryptanalysis of LEDAcrypt, a 2nd Round candidate in NIST's Post- Quantum Cryptography standardization process and one of 17 encryption schemes that remain as candidates for near-term standardization. LEDAcrypt consists of a

Online VM Auto-Scaling Algorithms for Application Hosting in a Cloud

September 1, 2020
Author(s)
Yang Guo, Alexander Stolyar, Anwar Walid
We consider the auto-scaling problem for application hosting in a cloud, where applications are elastic and the number of requests changes over time. The application requests are serviced by Virtual Machines (VMs), which reside on Physical Machines (PMs)

2019 NIST/ITL Cybersecurity Program Annual Report

August 24, 2020
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
During Fiscal Year 2019 (FY 2019), from October 1, 2018 through September 30, 2019, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy

Aggregating Atomic Clocks for Time-Stamping

August 3, 2020
Author(s)
Temur Saidkhodjaev, Jeff Voas, D. Richard Kuhn, Joanna DeFranco, Phil Laplante
A timestamp is a critical component in many applications, such as proof of transaction ordering or analyzing algorithm performance. This paper reports on a method called Verified Timestamping (VT) that improves the standard timestamp protocol. VT was

Connecting, Deploying, and Using the Smart Manufacturing Systems Test Bed

July 16, 2020
Author(s)
Moneer M. Helu, Thomas D. Hedberg Jr.
This report describes how different smart manufacturing standards and technologies, such as MTConnect, were integrated in the National Institute of Standards and Technology (NIST) Smart Manufacturing Systems (SMS) Test Bed to support the collection

Recommendations for Collecting, Curating, and Re-Using Manufacturing Data

July 16, 2020
Author(s)
Moneer M. Helu, Thomas D. Hedberg Jr.
This report provides general recommendations for collecting, curating, and re-using manufacturing data from both additive and subtractive processes. The intended audience includes researchers, technical-assessment personnel, and end-users who would like to

Big Data Analytics for Smart Factories of the Future

June 18, 2020
Author(s)
Robert Gao, Lihui Wang, Moneer Helu, Roberto Teti
Continued advancement of sensors has led to an ever-increasing amount of data of various physical nature to be acquired from production lines. As rich information relevant to the machines and processes are embedded within these "big data," how to

Energy Sector Asset Management: For Electric Utilities, Oil & Gas Industry

May 19, 2020
Author(s)
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide

Defining Actionable Rules for Verifying IOT Safety and Security

May 18, 2020
Author(s)
Kayla Ibrahim, Suryadipta Majumdar, Daniel Bastos, Anoop Singhal
Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the

Scalable Data Pipeline Architecture to Support the Industrial Internet of Things

May 17, 2020
Author(s)
Moneer M. Helu, Timothy A. Sprock, Daniel Hartenstine, Rishabh Venketesh, William Sobel
Managing manufacturing data remains challenging despite the growth of the Industrial Internet of Things (IIoT). While various standards and technologies enable greater access to data, scaling data processing and distribution can be difficult given the

Narrow Spectrum Software Testing Addressing Complexity and Trust

April 9, 2020
Author(s)
David R. Kuhn, Mohammad Raunak
Combination coverage based testing supplements basic structural coverage based test selection. This provides a sound test engineering method with defensible, quantitative measures of test completeness.

Strategic Roadmap for Interoperable Public Safety Video Analytics

April 3, 2020
Author(s)
Diane E. Ridgeway
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety

Strategic Roadmap for Interoperable Public Safety Analytics

March 24, 2020
Author(s)
Diane E. Ridgeway
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety

Voices of First Responders - Examining Public Safety Communication from the Perspective of 9-1-1 Call Takers and Dispatchers: Findings from User-Centered Interviews, Phase 1, Volume 4

March 24, 2020
Author(s)
Michelle P. Steves, Mary Theofanos, Yee-Yin Choong, Shanee Dawkins, Susanne M. Furman, Kristen K. Greene, Sandra Spickard Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, 9 1 1 communications, emergency medical services (EMS)
Displaying 51 - 75 of 1983