NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 31 to 40 of 992 records.
Resort by: Date / Title


31. An Empirical Comparison of Combinatorial and Random Testing
Topic: Information Technology
Published: 4/1/2014
Authors: Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N Kacker, David R Kuhn
Abstract: Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915439

32. Estimating Fault Detection Effectiveness
Topic: Information Technology
Published: 4/1/2014
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: [Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915440

33. Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Topic: Information Technology
Published: 4/1/2014
Authors: Jon Hagar, David R Kuhn, Raghu N Kacker, Thomas Wissink
Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT wou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915302

34. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911836

35. Methods for improving visibility measurement standards of powered industrial vehicles
Topic: Information Technology
Published: 2/28/2014
Authors: Roger V Bostelman, Jochen Teizer, Soumitry J. Ray, Mike Agronin, Dominic Albanese
Abstract: Poor visibility of powered industrial vehicles, such as forklifts, used in industry is often the cause of accidents that include pedestrians. Current standards allow up to 20% non-visible regions for forklifts where measurement of these regions is p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912877

36. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Information Technology
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

37. Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations
Topic: Information Technology
Published: 2/19/2014
Authors: Kelley L Dempsey, Gregory Allen Witte, Doug Rike
Abstract: The white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915325

38. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Information Technology
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385

39. Estimation of uncertainty in application profiles
Series: Technical Note (NIST TN)
Report Number: 1826
Topic: Information Technology
Published: 2/3/2014
Author: David W Flater
Abstract: Application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling tools today is sampling-based profiling, where a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914648

40. IT Risks
Topic: Information Technology
Published: 2/3/2014
Authors: Linda Wilbanks, David R Kuhn, Wes Chou
Abstract: Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915277



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series