Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Projects/Programs

Displaying 1 - 5 of 5

5G/6G Core Networks and Services

Ongoing
The main tasks of this program are: Task 1: 6G Core Network Architecture: I nvestigating AI-native architectures that not just execute AI/ML-based network functions but also support the creation, management, cooperation, measurement, and evolution of these functions. Task 2: Key Technologies Task 2

Information Centric Networking Program

Ongoing
Today the Internet relies on content distribution network overlays and caching to deliver most of its traffic. It is not clear that this architecture can continue to scale to meet data projections of the next decade and beyond. Current research in information-centric networking proposes a new

Internet Infrastructure Protection

Ongoing
In the FY 2016 ITL staff made significant contributions in the design, standardization, test and measurement of technologies to improve the security and robustness of the Internet’s global routing protocol BGP. NIST staff are key contributors to Internet Engineering Task Force (IETF) standards to

Trustworthy Intelligent Networks

Ongoing
Our current research efforts include: The application of AI/ML techniques to detect abuse of the Domain Name System (DNS). The development of measurement techniques to characterize the robustness of AI/ML approaches to botnet detection. The application of AI/ML techniques to detect anomalies in the

Trustworthy Networks Program

Ongoing
The need for Trustworthy Networking Internet Society Report on the Future of the Internet “Perhaps the most pressing danger to the future of the Internet is the rising scope and breadth of Cyber Threats.” “Addressing cyber threats should be the priority” “The scale of cyberattacks is steadily