An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Blockchain technology has enabled a new software paradigm for managing digital ownership in partial- or zero-trust environments. It uses tokens to conduct
Shelly Bagchi, Jeremy Marvel, Megan L. Zimmerman, Murat Aksu, Brian Antonishek
This report details the second annual, full-day workshop exploring the metrology necessary for repeatably and independently assessing the performance of robotic
Jeremy Marvel, Roger D. Eastman, Geraldine S. Cheok, Kamel S. Saidi, Tsai H. Hong, Elena R. Messina, Bob Bollinger, Paul Evans, Joyce Guthrie, Eric Hershberger, Carlos Martinez, Karen McNamara, James Wells
The special session on Technology Readiness Levels (TRLs) for Randomized Bin Picking was held during the morning session of the 2012 Performance Metrics for
Chuck Barber, Carolyn Burdette, Hugh Hayes, Caleb Luvonga, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Lee L. Yu
HAMQAP was launched in collaboration with the NIH Office of Dietary Supplements (ODS) in 2017. HAMQAP was established to enable laboratories to improve the
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020
Shelly Bagchi, Murat Aksu, Megan L. Zimmerman, Jeremy Marvel, Brian Antonishek
Verified and validated test methods, being necessary to measure the performance of complex systems, are important tools for driving innovation, benchmarking and
This paper explores a low-cost method to bridge analog public safety Land mobile radio (LMR) systems into a standards based Long Term Evolution (LTE) MCPTT
John M. Butler, Hariharan K. Iyer, Richard A. Press, Melissa Taylor, Peter Vallone, Sheila Willis
The National Institute of Standards and Technology (NIST) is a scientific research agency that works to advance measurement science, standards, and technology
This user guide describes an integrated set of C++ software tools for manipulating XML (eXtensible Markup Language) schemas and XML instance files. The tools
Robert D. Byers, David A. Waltermire, Christopher A. Turner
The purpose of this document is to leverage the strength of technical knowledge provided by the Common Vulnerabilities and Exposures (CVE) Numbering Authorities
Simulation and optimization methods are needed to design and operate large-scale, complex systems. Integrating the two presents a number of conceptual and
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
Access time generally describes the time associated with the establishment of a talk path upon user request to speak and has been identified as a key component
This is the second of a series of reports on the performance of face recognition algorithms on faces occluded by protective face masks commonly worn to reduce
Nicole D. Keller, Stephen Quinn, Karen Scarfone, Matthew Smith, Vincent Johnson
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships
Matthew P. Barrett, Nicole D. Keller, Stephen Quinn, Matthew Smith, Karen Scarfone
This Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships
Yooyoung Lee, Amy Yates, Haiying Guan, Jonathan G. Fiscus, Daniel Zhou
The interest of forensic techniques capable of detecting many different manipulation types has been growing, and system developments with machine learning
The FY 2018 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 23 participating agencies listed in
The FY 2019 summary, prepared by the National Institute of Standards and Technology (NIST), compiles the reports provided by 22 participating agencies listed in
Xiongnan Jin, Yooyoung Lee, Jonathan G. Fiscus, Haiying Guan, Amy Yates, Andrew Delgado, Daniel F. Zhou
With the development of storage, transmission, editing, and sharing tools, digital forgery images are propagating rapidly. The need for image provenance
Kevin M. Stine, Stephen D. Quinn, Gregory A. Witte, Robert Gardner
The increasing frequency, creativity, and severity of cybersecurity attacks means that all enterprises should ensure that cybersecurity risk is receiving
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The "Manufacturing
Kang B. Lee, Rick Candell, Hans-Peter Bernhard, Dave Cavalcanti, Zhibo Pang, Inaki Val
Wireless has emerged as an enabling technology to improve operational flexibility and efficiency for factory automation. The latest wireless technology
The Dictionary of Algorithms and Data Structures (DADS) is a publicly accessible dictionary of generally useful algorithms, data structures, algorithmic
Internet of Things (IoT) is the product of the worlds of information technology (IT) and operational technology (OT)converging. IoT combines the ability to
Katrice A. Lippa, Mary Bedner, Susan Tai, Carolyn Q. Burdette
The National Institute of Standards and Technology (NIST) established a Vitamin D Metabolites Quality Assurance Program (VitDQAP) in collaboration with the
Shahram Orandi, John M. Libert, Bruce Bandini, Kenneth Ko, John D. Grantham, Craig I. Watson
This study set out to examine the operational impact of introducing contactless fingerprint imagery to a modern fingerprint matching system that was designed
Shanee T. Dawkins, Kristen Greene, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network, the public safety community is in the process of supplementing the use of land mobile radios
Celia Paulsen, Jon M. Boyens, Jeffrey Ng, Kris Winkler, James Gimbi
As awareness of cybersecurity supply chain risks grows among federal agencies, there is a greater need for tools that evaluate the impacts of a supply chain
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross Leo, Richard Lee, Nancy Landreville, Anand K. Mishra, Yien Wang, Rodrigo Sardinas
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses