NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 1 to 10 of 710 records.
Resort by: Date / Title

1. A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 11/13/2015
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack s ...

2. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987 Rev 1
Topic: Information Technology
Published: 10/27/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce a co ...

3. A Sensor-Based Method for Diagnostics of Machine Tool Linear Axes
Topic: Information Technology
Published: 10/24/2015
Authors: Gregory W Vogl, Brian A Weiss, M Alkan Donmez
Abstract: A linear axis is a vital subsystem of machine tools, which are vital systems within many manufacturing operations. When installed and operating within a manufacturing facility, a machine tool needs to stay in good condition for parts production. All ...

4. NIST Big Data Interoperability Framework: Volume 1, Definitions
Series: Special Publication (NIST SP)
Report Number: 1500-1
Topic: Information Technology
Published: 10/22/2015
Author: Wo L Chang
Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data ...

5. Who Touched my Mission: Towards Probabilistic Mission Impact Assessment
Topic: Information Technology
Published: 10/12/2015
Authors: Xiaoyan Sun, Anoop Singhal, Peng Liu
Abstract: Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact ...

6. Retrieval and classification methods for textured 3D models: A comparative study
Topic: Information Technology
Published: 8/25/2015
Author: Afzal A Godil
Abstract: This paper presents a comparative study of six methods for the retrieval and classification of tex- tured 3D models, which have been selected as represen- tative of the state of the start and evaluated through 17 runs. To better analyse and control ...

7. gtklogger: A Tool For Systematically Testing Graphical User Interfaces
Series: Technical Note (NIST TN)
Report Number: 1862
Topic: Information Technology
Published: 8/20/2015
Authors: Stephen A Langer, Faical Yannick Palingwende Congo, Andrew Charles edmu Reid, Rhonald Lua, Valerie R. Coffman
Abstract: We describe a scheme for systematically testing the operation of a graphical user interface. The scheme provides a capability for generating event logs, which are recordings of a user session with the interface. These logs can be annotated with ...

8. The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
Topic: Information Technology
Published: 8/4/2015
Authors: Cathryn Alicia Ploehn, Kristen Greene
Abstract: Password management is the ubiquitous struggle of the modern human. Despite usability playing a vital role in authentication, many password policies and requirements focus on security without sufficient consideration of human factors. In fact, ...

9. Human Generated Passwords - the Impacts of Password Requirements and Presentation Styles
Topic: Information Technology
Published: 8/2/2015
Authors: Paul Y Lee, Yee-Yin Choong
Abstract: The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leav ...

10. Improved Security and Mobility Through Updated Interfaces for PIV Cards
Series: ITL Bulletin
Topic: Information Technology
Published: 7/21/2015
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to a ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series