An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The CSF 2.0 represents a suite of resources (documents and applications) that can be used individually, together, or in combination over time as cybersecurity...
The CSF 2.0 represents a suite of resources (documents and applications) that can be used individually, together, or in combination over time as cybersecurity...
The CSF 2.0 represents a suite of resources (documents and applications) that can be used individually, together, or in combination over time as cybersecurity...
Katherine Schroeder, Hung Trinh, Victoria Pillitteri
This document provides guidance on how an organization can develop information security measures to identify the adequacy of in-place security policies...
Katherine Schroeder, Hung Trinh, Victoria Pillitteri
This document provides guidance on how an organization can develop an information security measurement program with a flexible structure for approaching...
Michael Link, Andrew Shore, Rileigh Robertson, Behrang Hamadani, Dustin Poppendieck
Current Germicidal Ultraviolet (GUV) devices are designed to inactive pathogens in air at either 222 nm or 254 nm wavelengths. Previous research has...
The NIST Center for Neutron Research (NCNR) hosts the National Bureau of Standards Reactor (NBSR), which has been operational since 1967. The NBSR is aging, and...
Kristina Rigopoulos, Stephen Quinn, Cherilyn Pascoe, Jeffrey Marron, Amy Mahn, Daniel Topper
The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity...
Kristina Rigopoulos, Stephen Quinn, Cherilyn Pascoe, Jeffrey Marron, Amy Mahn, Daniel Topper
The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity...
Kristina Rigopoulos, Stephen Quinn, Cherilyn Pascoe, Jeffrey Marron, Amy Mahn, Daniel Topper
The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity...
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers...
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers...
This paper introduces a set of cellular vehicle-to-everything (C-V2X) datasets collected at the National Institute of Standards and Technology (NIST) Internet...
NIST hosted the NIST Workshop on the Requirements for an Accordion Cipher Mode 2024 on June 20–21, 2024 at the National Cybersecurity Center of Excellence in...
Bilva Chandra, Jesse Dunietz, Kathleen Roberts, Yooyoung Lee, Peter Fontana, George Awad
This report examines the existing standards, tools, methods, and practices, as well as the potential development of further science-backed standards and...
Eugenia Romantseva, Fernanda Piorino Macruz de Oliveira, Chad Sundberg, G. Sitta Sittampalam, Elizabeth Strychalski
The workshop on Advancing Cell-free Manufacturing: Challenges in Scale-up and Automation sought to identify and prioritize actionable steps towards more...
This document discusses various topics related to the practical implementation of the NIST Voting Common Data Formats. This includes materials on how the CDFs...
Colleen Bryan Sallee, Therese Butler, Jenna Klingsick, John Molloy, James Yen
Standard Reference Material (SRM) 1641f Mercury in Water is intended for the calibration of instruments and techniques used for the determination of mercury in...
Historically, hardware has been assumed to be inherently secure. However, chips are both created with software and contain complex encodings (e.g., circuit...
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers...
This report presents an approach to verifying executability of system behavior models by treating them as logical constraint problems solved using Alloy...
A specific sub-set of comparison data is presented for two NIST water-triple-point cells that provide traceability to the results of the 2023 Consultative...
Zachary Trautt, Austin McDannald, Brian DeCost, Howard Joress, A. Gilad Kusne, Francesca Tavazza, Tom Blanton
The National Institute of Standards and Technology and the International Centre for Diffraction Data co-hosted a workshop on 17-18 October 2023 to identify and...
Yee-Yin Choong, Johanna Camara, Tracey Schock, Clay Davis
One way NIST ensures that measurements are accurate and compatible is by certifying and providing over 1 300 Standard Reference Materials® (SRM®) with well...
Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alex Holbrook, Matthew Fallon
Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are...
Daniel Rhee, DongHun Yeo, Mehedy Mashnad, Brian Carman, Charys Clay
This NIST Technical Note presents the User's Manual for the DAD_PBD version 2.0 software, a user-friendly tool for the advanced structural design of dynamically...