Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 351 - 375 of 2210

2017 NIST/ITL Cybersecurity Program: Annual Report

September 18, 2018
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry

Securing Wireless Infusion Pumps in Healthcare Delivery Organizations

August 20, 2018
Author(s)
Gavin W. O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang, Kangmin Zheng
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. However, today’s medical devices connect to a variety of healthcare systems, networks, and other tools within a healthcare

Cybertrust in the IoT Age

July 31, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis
The Internet of Things generates new opportunities but creates new challenges with respect to trustworthiness. Computing, architecture, and verification changes are inevitable to meet these challenges, particularly if predictions of 20 billion to 50

Voices of First Responders - Identifying Public Safety Communication Problems: Findings from User-Centered Interviews, Phase 1, Volume 1

July 31, 2018
Author(s)
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies

User Context: An Explanatory Variable in Phishing Susceptibility

July 15, 2018
Author(s)
Kristen K. Greene, Michelle P. Steves, Mary Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training

In IoT We Trust?

July 13, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Phillip Laplante
In this short article, we review an abbreviated list of trust challenges that we foresee as increased adoption transforms the IoT into another ubiquitous technology just as the Internet is. These challenges are in no specific order, and are by no means a

Towards Managing Age of Network State Information in Challenged Networks

July 8, 2018
Author(s)
Vladimir V. Marbukh
Age of Information (AoI) is a recently introduced metric for freshness of the real-time information, which requires frequent updates. This paper argues that AoI is useful not only for real-time network applications, but also for network state information

Superconducting optoelectronic networks III: synaptic plasticity

July 5, 2018
Author(s)
Jeffrey M. Shainline, Adam N. McCaughan, Sonia M. Buckley, Christine A. Donnelly, Manuel C. Castellanos Beltran, Michael L. Schneider, Richard P. Mirin, Sae Woo Nam
As a means of dynamically reconfiguring the synaptic weight of a superconducting optoelectronic loop neuron, a superconducting flux storage loop is inductively coupled to the synaptic current bias of the neuron. A standard flux memory cell is used to

Pseudo-exhaustive Verification of Rule Based Systems

July 1, 2018
Author(s)
David R. Kuhn, Dylan J. Yaga, Raghu N. Kacker, Yu Lei, Chung Tong Hu
Rule-based systems are important in application domains such as artificial intelligence and business rule engines, as well as formal methods for software design. When translated into an implementation, simple expressions in rules may map to thousands of

No Phishing beyond This Point

June 27, 2018
Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos
As phishing continues to evolve, what is your organization doing to stay off the hook?

NIST Big Data Interoperability Framework: Volume 1, Big Data Definitions [Version 2]

June 26, 2018
Author(s)
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. The growth of data is outpacing scientific and technological advances in data analytics. Opportunities exist with Big Data to

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies [Version 2]

June 26, 2018
Author(s)
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 9, Adoption and Modernization

June 26, 2018
Author(s)
Wo L. Chang, Russell Reinsch, NBD-PWG NIST Big Data Public Working Group
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of value captured by companies deploying Big Data initiatives has not been equivalent across all
Displaying 351 - 375 of 2210