An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search tasks for professional searchers, such as law enforcement agencies, police officers, and patent examiners, are often more complex than open domain Web
The mission of the National Institute of Standards and Technology's (NIST) CHIPS Research and Development Office (CHIPS R&D) under the Department of Commerce's
In December 2023, NIST released a publication outlining a proposed data-sharing platform, titled "Building a Metrology Exchange to Innovate in Semiconductors
Eduardo Takamura, Jeremy Licata, Victoria Yan Pillitteri
In 2017, NIST published a methodology for supporting the automation of SP 800-53 control assessments in the form of IR 8011. IR 8011 is a multi-volume series
Michael Powell, John Hoyt, Aslam Sherule, Lynette Wilcox
Manufacturers are increasingly targeted in cyber-attacks. Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate
Daniel Atherton, Reva Schwartz, Peter Fontana, Patrick Hall
The NIST (National Institute of Standards and Technology) glossary of terms related to trustworthy and responsible artificial intelligence (AI) and machine
This document provides guidance and resources for how to test voting systems against the usability and accessibility requirements in the Voluntary Voting System
Lynn Baumeister, Whitney Quesenbery, Sharon J. Laskowski
Accessible vote by mail (AVBM) provides options for voters with disabilities to complete their absentee or vote by mail ballots independently and privately
James McCarthy, Joseph Brule, Dan Mamula, Karri Meldorf
The objective of this Cybersecurity Profile is to identify an approach to assess the cybersecurity posture of Hybrid Satellite Networks (HSN) that provide
The purpose of this report is to document additional simulations that staff of the U.S. National Institute of Standards and Technology (NIST) performed, at the
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural
On February 22, 2022, NIST issued a public Request for Information (RFI), "Evaluating and Improving NIST Cybersecurity Resources: The Cybersecurity Framework
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for
NIST Special Publication 800-207 defines zero trust is a set of cybersecurity principles used when planning and implementing an enterprise architecture. These
Executive Order (EO) 14028, "Improving the Nation's Cybersecurity," tasks the National Institute of Standards and Technology (NIST), in coordination with the
This white paper highlights a recent mapping effort between the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)
This paper applies technology-transfer efficiency metrics—filing rate and transfer rate— proposed in the academic literature on technology transfer to data on
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information
Jennifer F. Helgeson, Eleanor D. Pierel, Kirstin Dow
To gather more in-depth information about how disasters affect businesses, the National Institute of Standards and Technology (NIST) and the National Oceanic
Jennifer F. Helgeson, Juan F. Fung, Yating Zhang, Alfredo R. Roa Henriquez, Ariela Zycherman, Claudia Nierenberg, David T. Butry, Donna H. Ramkissoon
Small and medium-sized enterprises (SMEs) make up 44% of U.S. economic activities and are the lifeline for many local economies, employing 59 million people in
The Dicke model famously exhibits a phase transition to a superradiant phase with a macroscopic population of photons and is realized in multiple settings in
Ellen M. Voorhees, Nick Craswell, Bhaskar Mitra, Daniel Campos, Emine Yilmaz
The Deep Learning Track is a new track for TREC 2019, with the goal of studying ad hoc ranking in a large data regime. It is the first track with large human
Donna F. Dodson, Murugiah Souppaya, Karen Scarfone
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
This document is part of Case Studies in Cyber Supply Chain Risk Management-new research that builds on the CSD C-SCRM program's 2015 publications aimed at
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case