Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Advancements in Computational Wind Engineering Workshop Report

Author(s)
Donald Scott, Jennifer Goupil, Melissa Burton, Catherine Gorle, Ahsan Kareem, Ted Stathopoulos, Bradley Young
In September 2022, the Structural Engineering Institute of the American Society of Civil Engineers commenced a project under National Institute of Standards and...

Intelligent Flexible Manufacturing Cell

Author(s)
Ethan Hollingsworth, Eric Holterman, Allison Barnard Feeney
Designed around Industry 4.0 based digital technology, flexible manufacturing cells are envisioned to comprise a variety of machines capable of peer-to-peer...

2023 NIST Summary of U.S. Legal Metrology Activities

Author(s)
Lisa Warfield, Katrice Lippa, Jan Konijnenburg, Loren Minnich, Gloria Diane Lee, Juana Williams, John McGuire
The NIST Office of Weights and Measures (OWM) presents its second issue of the 2023 NIST Annual Summary of U.S. Legal Metrology Activities report. This report...

Enterprise Impact of Information & Communications Technology Risk

Author(s)
Stephen Quinn, Nahla Ivy, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Karen Scarfone, Robert Gardner, Julie Chua
All enterprises should ensure that information and communications technology (ICT) risk receives appropriate attention within their enterprise risk management...

Information and Communications Technology (ICT) Risk Outcomes

Author(s)
Stephen Quinn, Nahla Ivy, Karen Scarfone, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Robert Gardner, Julie Chua
The increasing frequency, creativity, and severity of technology attacks means that all enterprises should ensure that information and communications technology...

NIST Phish Scale User Guide

Author(s)
Shanee Dawkins, Jody Jacobs
The phishing cyber threat exploits vulnerabilities in the U.S. and around the world across private and public sectors. Embedded phishing awareness training...

NIST SI Units Card Deck

Author(s)
Dinelka Jagoda, Elizabeth Benham
Welcome to the SI Units Card Deck! This interactive educational activity offers a fun way for students to enhance their understanding of the International...

Certification of Standard Reference Material® 2386 Avocado Powder

Author(s)
Melissa M. Phillips, Laura Wood, Joseph Browning, George Caceres, Grace Hahm, Mahboubeh Hanaee, Abigail Lee, Karen Murphy, Rabia Oflaz, Rick L. Paul, Benjamin Place, Jeanice "Brown Thomas ", James H. Yen
The National Institute of Standards and Technology (NIST) recently released SRM 2386 Avocado Powder which has value assignment for over 70 analytes. This...

Vulnerability Test Suite Generator (VTSG) Version 3

Author(s)
Paul E. Black, William Mentzer, Elizabeth Fong, Bertrand Stivalet
The Vulnerability Test Suite Generator (VTSG) Version 3 can create vast numbers of synthetic programs with and without specific flaws or vulnerabilities. Such...
Was this page helpful?