NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Your search results exceeded 1,000 records. Please refine your search and try again.
Displaying records 11 to 20 of 1000 records.
Resort by: Date / Title

11. Cryptographic Module Validation Program (CMVP)
Series: ITL Bulletin
Topic: Information Technology
Published: 12/1/2014
Authors: Apostol T Vassilev, Larry Feldman, Gregory A. Witte
Abstract: The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based sta ...

12. Screening for factors affecting application performance in profiling measurements
Series: Technical Note (NIST TN)
Report Number: 1855
Topic: Information Technology
Published: 10/30/2014
Author: David W Flater
Abstract: This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods. Together with rela ...

13. An Additive Manufacturing Test Artifact
Series: Journal of Research (NIST JRES)
Report Number: 119.017
Topic: Information Technology
Published: 10/23/2014
Authors: Shawn P Moylan, John A. Slotwinski, A L Cooke, Kevin K Jurrens, M Alkan Donmez
Abstract: We propose a test artifact, intended for standardization, for the purpose of evaluating the performance of additive manufacturing (AM) systems. A thorough analysis of previously proposed AM test artifacts as well as experience with machining tes ...

14. An ACT-R Model of Elliptical Endpoint Error Distributions in a Mobile Touchscreen 2-D Fitts‰ Law Task
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8015
Topic: Information Technology
Published: 10/14/2014
Authors: Kristen Greene, Melissa A. Gallagher, Franklin Tamborello
Abstract: Given the high propensity of users‰ motoric errors with smaller touchscreen buttons, knowing the endpoint distributions for finger- based pointing and tapping is especially important for higher-fidelity predictive modeling of tasks on such devices. ...

15. Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8010
Topic: Information Technology
Published: 10/1/2014
Authors: Frederick E Boland Jr, Elizabeth Nee nee Fong
Abstract: The World Wide Web (W3C) Web Accessibility Initiative has developed comprehensive guidance on evaluating web accessibility. Web Content Accessibility Guidelines (WCAG) 2.0 specifies the success criteria for evaluating the conformance of web pages. ...

16. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
Series: Special Publication (NIST SP)
Report Number: 1108r3
Topic: Information Technology
Published: 10/1/2014
Authors: Christopher Greer, David A Wollman, Dean Eldon Prochaska, Paul A Boynton, Jeffrey A. Mazer, Cuong T Nguyen, Gerald J FitzPatrick, Thomas L Nelson, Galen H Koepke, Allen R Hefner Jr, Victoria Y Pillitteri, Tanya L Brewer, Nada T Golmie, David H Su, Allan C Eustis, David G Holmberg, Steven T Bushby
Abstract: Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110‹140) directs NIST ,,to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperabili ...

17. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
Topic: Information Technology
Published: 9/11/2014
Authors: Lingyu Wang, Meng Zhang, Sushil Jajodia, Anoop Singhal, M. Albanese
Abstract: The interest in diversity as a security mechanism has recently been revived in various applications, such as Moving Target Defense (MTD), resisting worms in sensor networks, and improving the robustness of network routing. However, most existing effo ...

18. The Future of Cybersecurity Education
Topic: Information Technology
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

19. IT Pro Conference on Information Systems Governance
Topic: Information Technology
Published: 8/6/2014
Authors: Irena Bojanova, David R Kuhn
Abstract: Approximately 100 IT professionals participated in the 2014 IT Pro Conference on Information Systems Governance, held at the National Institute of Standards and Technology (NIST) on May 22, 2014 ( Information systems gover ...

20. Approximate Matching: Definition and Terminology
Series: Special Publication (NIST SP)
Report Number: 800-168
Topic: Information Technology
Published: 7/2/2014
Authors: Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R White
Abstract: This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other o ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series