An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This publication is the Proceedings of the 38th Joint Meeting of the U.S.-Japan Panel on Wind and Seismic Effects. The meeting was held at the National
Smokeview is a software tool designed to visualize numerical calculations generated by the NIST Fire Dynamics Simulator (FDS), a computational fluid dynamics
YaShian Li-Baboud, Cuong T. Nguyen, Marc A. Weiss, Dhananjay Anand, Allen R. Goldstein, Jason Allnutt, Bob Noseworthy, Ravi Subramaniam
Correct time and timing is one of the foundational elements in enabling the communication and orchestration of technologies for accurate and optimal wide area
Israel Lopez Coto, Kuldeep R. Prasad, James R. Whetstone
The Indianapolis Flux Experiment (INFLUX) aims to use a top-down inversion methodology to quantify sources of Greenhouse Gas (GHG) emissions over an urban
A total of 432 registered participants from 11 countries contributed to a successful first-ever international symposium devoted exclusively to the topic of
Jeanita Pritchett, Katrice A. Lippa, Mary Bedner, Carolyn Q. Burdette, Johanna Camara, Brian E. Lang, Michael A. Nelson, Lane C. Sander, Lorna T. Sniegoski
The one week NIST-SIM chemical metrology training opportunity was designed to provide SIM NMI/DI laboratory personnel with in-depth classroom and hands-on
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew C. Smith, Gregory Witte, Karen Scarfone
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include
A major aspect of characterizing the built environment is identifying key infrastructure dependencies that may exist. Some of these dependencies are obvious
Mark L. Badger, Murugiah Souppaya, Mark R. Trapnell, Eric R. Trapnell, Dylan J. Yaga, Karen Scarfone
This publication assists IT professionals in securing Apple OS X 10.10 desktop and laptop systems within various environments. It provides detailed information
[Superseded by NIST SP 800-160 (November 2016, including updates as of 01-03-2016)] With the continuing frequency, intensity, and adverse consequences of cyber
The National Institute of Standards and Technology (NIST) workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV) was held on
The workshop occurred on 12 July 2016 at National Institute of Standards and Technology (NIST). The workshop's object was software as a product. 20 position
This report of analysis documents procedures used to obtain certified values and associated uncertainties of the density of iso-octane SRM 2214 over an extended
This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called
Homeowners and builders have increasingly strived to build low energy homes. As building materials, equipment, and methods have improved and renewable energy
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information
David F. Ferraiolo, Ramaswamy Chandramouli, Chung Tong Hu, David R. Kuhn
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) are very different attribute based access control (ABAC) standards
Once a community identifies its resilience gaps, the challenge shifts to identifying solutions to close those gaps. One of the most helpful actions is to
This Guide Brief provides an example of how to determine the anticipated performance of water and wastewater systems subjected to an earthquake and tsunami
This Guide Brief provides guidance for determining the anticipated performance of building clusters and infrastructure systems when subjected to hazard events
This Guide Brief provides additional rationale and guidance regarding Step 2 in the GuideUnderstand the Situation for how to Identify Social Institutions
This Guide Brief provides additional rationale and guidance regarding the first part of Step 2 in the Guide, Characterize social functions and dependencies
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information
This document is intended to provide guidance to the Federal Government for using cryptography and NIST's cryptographic standards to protect sensitive, but