Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Wireless Ad-hoc Network for Trades Tracking

Author(s)
D P. Starin, William C. Stone
The NIST Construction Metrology and Automation Group (CMAG), at the suggestion of various members of the CII FIATECH consortium, investigated the possibility of

Open Media Forensics Challenge (OpenMFC) 2020-2021: Past, Present, and Future

Author(s)
Haiying Guan, Yooyoung Lee, Lukas Diduch, Jesse Zhang, Ilia Ghorbanian Bajgiran, Timothee Kheyrkhah, Peter Fontana, Jonathan G. Fiscus
This document describes the online leaderboard public evaluation program, Open Media Forensics Challenge (OpenMFC) 2021-2022. In the report, first, the

Health Assessment Measurements Quality Assurance Program: Exercise 6 Final Report

Author(s)
Chuck Barber, Carolyn Burdette, Hugh Hayes, Monique Johnson, Shaun Kotoski, Jacolin Murray, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Andrea Yarberry
The Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of

IoT Non-Technical Supporting Capability Core Baseline

Author(s)
Michael Fagan, Katerina N. Megas, Jeffrey Marron, Kevin Gerard Brady, Barbara Bell Cuthill, Rebecca Herold
Non-technical supporting capabilities are actions a manufacturer or third-party organization performs in support of the cybersecurity of an IoT device. This

Approaches for Federal Agencies to Use the Cybersecurity Framework

Author(s)
Jeffrey Marron, Victoria Yan Pillitteri, Jon M. Boyens, Stephen Quinn, Gregory Witte
The document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a

Statistics of Visual Features in the Human Iris

Author(s)
George W. Quinn, James Matey, Patrick J. Grother, Edward Watters
In most current applications of iris recognition, matching is done by computer algorithms. The dominant algorithms are based on the work of John Daugman and are

Cannabis Quality Assurance Program: Exercise 1 Final Report

Author(s)
MARYAM ABDUL-RAHMAN, Melissa M. Phillips, Walter Brent Wilson
NIST launched a CannaQAP in 2020 to improve the comparability of the analytical measurements in forensic and Cannabis (hemp and marijuana) testing laboratories

Review of the Advanced Encryption Standard

Author(s)
Nicky Mouha, Morris Dworkin
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms

Aerial LTE Demonstration Report

Author(s)
Maxwell Maurice, Sam Ray
In this paper, we investigate a Long Term Evolution (LTE) network mounted on an airborne small unmanned aircraft system (sUAS) to provide broadband connectivity

NIST Fingerprint Image Quality 2

Author(s)
Elham Tabassi, Martin Olsen, Oliver Bausinger, Christoph Busch, Andrew Figlarz, Gregory Fiumara, Olaf Henniger, Johannes Merkle, Timo Ruhland, Christopher Schiel, Michael Schwaiger
NIST Fingerprint Image Quality (NFIQ 2) is open source software that links image quality of optical and ink 500 pixel per inch fingerprints to operational

User Guide for NIST Media Forensic Challenge (MFC) Datasets

Author(s)
Haiying Guan, Andrew Delgado, Yooyoung Lee, Amy Yates, Daniel Zhou, Timothée N. Kheyrkhah, Jonathan G. Fiscus
NIST released a set of Media Forensic Challenge (MFC) datasets developed in DARPA MediFor (Media Forensics) project to the public in the past 5 years. More than

Hardware-Enabled Security: Container Platform Security Prototype

Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi
In today's cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control