Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51 - 75 of 383

Reusable Network Simulation for CPS Co-Simulations

May 9, 2023
Author(s)
Himanshu Neema, Harmon Nine, Thomas Roth
Cyber-Physical Systems (CPS) require seamless integration of physical and computation components through communication networks. They often contain sub-systems from different physical domains (e.g., electrical, mechanical, and electronic) that must

Comparing Economic Benefits of HVAC Control Strategies in Grid-Interactive Residential Buildings

May 1, 2023
Author(s)
Brian Woo-Shem, Kaleb Pattawi, Hannah Covington, Patrick McCurdy, Chenli Wang, Thomas Roth, Cuong Nguyen, Yuhong Liu, Hohyun Lee
Energy consumption in buildings continues to rise with increased deployment of energy-consuming equipment such as Heating, Ventilation, and Air Conditioning (HVAC) amid a growing world economy. Renewable energy is projected to comprise a majority of the

On Predistortion Filtering for Switched Beamforming With Phased-Array Antennas

March 26, 2023
Author(s)
Jack Chuang, Camillo Gentile
In recent work, we proposed sweeping the antennas of phased arrays and beamforming in postprocessing – what we coined switched beamforming – instead of sweeping beams through analog beamforming – what the arrays are designed for. Not only is it orders of

IoT Capabilities Composition and Decomposition: A Systematic Review

March 22, 2023
Author(s)
Edward Griffor, Khalid Halba, ahmed lbath, Anton Dahbura
Internet of Things (IoT) capabilities are features or services produced by IoT devices. IoT capabilities composition brings existing capabilities together to create a novel service with added value. IoT Capabilities decomposition works the other way around

Discovery of digital forensic dataset characteristics with CASE-Corpora

February 13, 2023
Author(s)
Alexander Nelson, Eoghan Casey
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable

Scalable Modeling of Human Blockage at Millimeter-Wave: A Comprehensive Analysis of Knife-Edge Diffraction, the Uniform Theory of Diffraction, and Physical Optics Against 60 GHz Channel Measurements

December 22, 2022
Author(s)
Anmol Bhardwaj, Camillo Gentile, Jelena Senic
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic

Impact of Using Soft Exposure Thresholds in Automatic Contact Tracing

December 21, 2022
Author(s)
Kamran Sayrafian, Brian D. Cloteaux, Vladimir Marbukh
Current automatic exposure notification apps primarily operate based on hard distance/time threshold guidelines (e.g., 2 m/15 min in the United States) to determine exposures due to close contacts. However, the possibility of virus transmission through

Towards Generative Adversarial Network on Industrial Internet of Things

October 1, 2022
Author(s)
Cheng Qian, Wei Yu, Chao Lu, David W. Griffith, Nada T. Golmie
Machine learning, as a viable way of conducting data analytics, has been successfully applied to a number of areas. Nonetheless, the lack of sufficient data is one critical issue for applying machine learning in Industrial Internet of Things (IIoT) systems

Profile of the IoT Core Baseline for Consumer IoT Products

September 20, 2022
Author(s)
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home or personal use). It can also be a starting

Workshop Summary Report for "Building on the NIST Foundations: Next Steps in IoT Cybersecurity"

September 20, 2022
Author(s)
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity criteria at a virtual workshop in June 2022. The purpose of this workshop was to obtain feedback on
Displaying 51 - 75 of 383
Was this page helpful?