Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 276 - 300 of 2210

Energy Sector Asset Management: For Electric Utilities, Oil & Gas Industry

May 19, 2020
Author(s)
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide

Defining Actionable Rules for Verifying IOT Safety and Security

May 18, 2020
Author(s)
Kayla Ibrahim, Suryadipta Majumdar, Daniel Bastos, Anoop Singhal
Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the

Scalable Data Pipeline Architecture to Support the Industrial Internet of Things

May 17, 2020
Author(s)
Moneer M. Helu, Timothy A. Sprock, Daniel Hartenstine, Rishabh Venketesh, William Sobel
Managing manufacturing data remains challenging despite the growth of the Industrial Internet of Things (IIoT). While various standards and technologies enable greater access to data, scaling data processing and distribution can be difficult given the

Narrow Spectrum Software Testing Addressing Complexity and Trust

April 9, 2020
Author(s)
David R. Kuhn, Mohammad Raunak
Combination coverage based testing supplements basic structural coverage based test selection. This provides a sound test engineering method with defensible, quantitative measures of test completeness.

Strategic Roadmap for Interoperable Public Safety Video Analytics

April 3, 2020
Author(s)
Diane E. Ridgeway
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety

Strategic Roadmap for Interoperable Public Safety Analytics

March 24, 2020
Author(s)
Diane E. Ridgeway
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety

Voices of First Responders - Examining Public Safety Communication from the Perspective of 9-1-1 Call Takers and Dispatchers: Findings from User-Centered Interviews, Phase 1, Volume 4

March 24, 2020
Author(s)
Michelle P. Steves, Mary Theofanos, Yee-Yin Choong, Shanee Dawkins, Susanne M. Furman, Kristen K. Greene, Sandra Spickard Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, 9 1 1 communications, emergency medical services (EMS)

Voices of First Responders—Nationwide Public Safety Communication Survey Methodology: Development, Dissemination, and Demographics, Phase 2, Volume 1

March 20, 2020
Author(s)
Kristen Greene, Shanee T. Dawkins, Sandra S. Prettyman, Pamela J. Konkol, Mary F. Theofanos, Kevin C. Mangold, Susanne M. Furman, Michelle P. Steves
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios (LMR) to a technology ecosystem that will include a variety of new communication tools

Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security

March 16, 2020
Author(s)
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Advanced Persistent Threats (APT) has become the concern of many enterprise networks. APT can remain undetected for a long time span and lead to undesirable consequences such as stealing of sensitive data, broken workflow, and so on. To achieve the attack

Workshop on Machine Learning for Optical Communication Systems: a summary

March 8, 2020
Author(s)
Joshua A. Gordon, Abdella Battou, Dan Kilper
A summary and overview of a public workshop on machine learning for optical Communication systems held on August 2nd 2019, by the Communications Technology Laboratory at the National Institute of Standards and Technology in Boulder, CO.

Digital Identity Guidelines [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management [includes updates as of 03-02- 2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray Perlner, Andrew Regenscheid, William E. Burr, Justin P. Richer, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Federation and Assertions [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, Justin P. Richer, Sarah K. Squire, James L. Fenton, Ellen M. Nadeau, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Input Space Coverage Matters

January 15, 2020
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei, Dimitris Simos
Testing is the most commonly used approach for software assurance, yet it remains as much judgement and art as science. Structural coverage adds some rigor to the process by establishing formally defined criteria for some notion of test completeness, but
Displaying 276 - 300 of 2210