Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 204

Comparing Economic Benefits of HVAC Control Strategies in Grid-Interactive Residential Buildings

May 1, 2023
Author(s)
Brian Woo-Shem, Kaleb Pattawi, Hannah Covington, Patrick McCurdy, Chenli Wang, Thomas Roth, Cuong Nguyen, Yuhong Liu, Hohyun Lee
Energy consumption in buildings continues to rise with increased deployment of energy-consuming equipment such as Heating, Ventilation, and Air Conditioning (HVAC) amid a growing world economy. Renewable energy is projected to comprise a majority of the

On Predistortion Filtering for Switched Beamforming With Phased-Array Antennas

March 26, 2023
Author(s)
Jack Chuang, Camillo Gentile
In recent work, we proposed sweeping the antennas of phased arrays and beamforming in postprocessing – what we coined switched beamforming – instead of sweeping beams through analog beamforming – what the arrays are designed for. Not only is it orders of

IoT Capabilities Composition and Decomposition: A Systematic Review

March 22, 2023
Author(s)
Edward Griffor, Khalid Halba, ahmed lbath, Anton Dahbura
Internet of Things (IoT) capabilities are features or services produced by IoT devices. IoT capabilities composition brings existing capabilities together to create a novel service with added value. IoT Capabilities decomposition works the other way around

Discovery of digital forensic dataset characteristics with CASE-Corpora

February 13, 2023
Author(s)
Alexander Nelson, Eoghan Casey
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable

Scalable Modeling of Human Blockage at Millimeter-Wave: A Comprehensive Analysis of Knife-Edge Diffraction, the Uniform Theory of Diffraction, and Physical Optics Against 60 GHz Channel Measurements

December 22, 2022
Author(s)
Anmol Bhardwaj, Camillo Gentile, Jelena Senic
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic

Impact of Using Soft Exposure Thresholds in Automatic Contact Tracing

December 21, 2022
Author(s)
Kamran Sayrafian, Brian D. Cloteaux, Vladimir Marbukh
Current automatic exposure notification apps primarily operate based on hard distance/time threshold guidelines (e.g., 2 m/15 min in the United States) to determine exposures due to close contacts. However, the possibility of virus transmission through

Towards Generative Adversarial Network on Industrial Internet of Things

October 1, 2022
Author(s)
Cheng Qian, Wei Yu, Chao Lu, David W. Griffith, Nada T. Golmie
Machine learning, as a viable way of conducting data analytics, has been successfully applied to a number of areas. Nonetheless, the lack of sufficient data is one critical issue for applying machine learning in Industrial Internet of Things (IIoT) systems

Profile of the IoT Core Baseline for Consumer IoT Products

September 20, 2022
Author(s)
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home or personal use). It can also be a starting

Workshop Summary Report for "Building on the NIST Foundations: Next Steps in IoT Cybersecurity"

September 20, 2022
Author(s)
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity criteria at a virtual workshop in June 2022. The purpose of this workshop was to obtain feedback on

Maximizing Harvested Energy in Coulomb Force Parametric Generators

September 5, 2022
Author(s)
Masoud Roudneshin, Kamran Sayrafian, Amir Aghdam
Miniaturized wearable or implantable medical sensors are becoming an important application area for kinetic-based micro energy-harvesters. These harvesters can generate power through the natural human body motion. The architecture based on the Coulomb

PION: Password-based IoT Onboarding Over Named Data Networking

August 11, 2022
Author(s)
Davide Pesavento, Junxiao Shi, Kerry McKay, Lotfi Benmohamed
While the IoT market continues to grow, securing IoT systems remains a challenge as successful cyberattacks keep escalating. Named Data Networking (NDN) offers a number of advantages over traditional IP-based communications and is considered a promising

Towards an Integrated Simulation Platform for Internet of Vehicles

August 11, 2022
Author(s)
Xing Liu, Wei Yu, Cheng Qian, David W. Griffith, Nada T. Golmie
The interconnection and digitization of the physical world has increased dramatically with the widespread deployment of network communication and the rapid development of the Internet of Things (IoT). Application scenarios and requirements in IoT are more

Security Guidance for First Responder Mobile and Wearable Devices

July 20, 2022
Author(s)
Gema Howell, Kevin Gerard Brady, Don Harriss, Scott Ledgerwood
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as mobile devices, tablets and wearables. These devices offer new ways for first responders to complete their missions but may also

Analyzing Data Privacy for Edge Systems

July 14, 2022
Author(s)
Olivera Kotevska, Jordan Johnson, A. Gilad Kusne
Internet-of-Things (IoT)-based streaming applications are all around us. Currently, we are transitioning from IoT processing being performed on the cloud to the edge. While moving to the edge provides significant networking efficiency benefits, IoT edge

Discovery of digital forensic dataset characteristics with CASE-Corpora

July 11, 2022
Author(s)
Alexander Nelson
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable

Integrating Multiple HLA Federations for Effective Simulation-Based Evaluations of CPS

June 28, 2022
Author(s)
Thomas Roth, Wenqi Guo, Chenli Wang, Himanshu Neema, Anirban Bhattacharjee
Cyber-Physical Systems (CPS) are complex systems of computational, physical, and human components integrated to achieve some function over one or more networks. The use of distributed simulation, or co-simulation, is one method often used to analyze the
Displaying 26 - 50 of 204