An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
David L. Duewer, Jeanice "Brown Thomas ", Margaret Kline, Willie May, Katherine E. Sharpless
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated 79 "Round
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to
This report of the Advanced Communications Technologies Working Group of the Interagency Committee on Standards Policy (ICSP) provides an overview of Federal
This report is a part of a series of studies on the topic of face morphing, its relevance and implications as a vulnerability to automated face recognition, and
Gema Howell, Kevin Gerard Brady, Don Harriss, Scott Ledgerwood
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as mobile devices, tablets and wearables
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process
David L. Duewer, Jeanice Brown Thomas, Stephen Young
From 1984 to 2017, the National Institute of Standards and Technology (NIST) Micronutrients Measurement Quality Assurance Program (MMQAP) coordinated a series
This document provides a new Incident Handling framework dedicated to Operational Technology. This framework expands the traditional technical steps by giving
NIST has developed a user-friendly spreadsheet-based software package for the Master Curve analysis of fracture toughness tests performed in the ductile-to
NIST provides certified reference Charpy specimens to companies and laboratories around the world for the indirect verification of impact machines in accordance
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more
SCAP Composer is a software application from the National Institute of Standards and Technology (NIST) for creating Security Content Automation Protocol (SCAP –
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Ryan Savino, Tim Knoll, Uttam Shetty, Mourad Cherfaoui, Raghu Yeluri, Don Banks, Akash Malhotra, Michael Jordan, Dimitrios Pendarakis, Peter Romness
In today's cloud data centers and edge computing, attack surfaces have shifted and, in some cases, significantly increased. At the same time, hacking has become
In today's cloud data centers and edge computing, attack surfaces have significantly increased, cyber attacks are industrialized, and most security control
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
Keith A. Stouffer, Joshua Lubell, Michael Pease, Evan K. Wallace
As supply chains become more complex and the origins of products become harder to discern, efforts are emerging that improve traceability of goods by exchanging
Augmented Reality (AR) is an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed
NIST has developed a user-friendly spreadsheet-based software for the analysis of elastic-plastic fracture toughness tests conducted according to ASTM E1820-20b
Organizational security awareness programs may experience a number of challenges, including lack of funding and staff with the appropriate knowledge and skills
Organizational security awareness programs may experience a number of challenges, including lack of resources, difficulty measuring the impact of the program
Prior industry surveys and research studies have revealed that organizational security awareness programs may face a number of challenges, including lack of
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
This report presents an approach to verifying executability of system behavior models by treating them as logical constraint problems solved using Alloy