Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 651 - 675 of 2211

Deployment-driven Security Configuration for Virtual Networks

December 28, 2014
Author(s)
Ramaswamy Chandramouli
Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines (VMs)

Guidelines for Derived Personal Identity Verification (PIV) Credentials

December 19, 2014
Author(s)
Hildegard Ferraiolo, David A. Cooper, Salvatore Francomacaro, Andrew R. Regenscheid, Jason Mohler, Sarbari Gupta, William E. Burr
This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove control

Metrics of Security

December 15, 2014
Author(s)
Yi Cheng, Julia Deng, Jason Li, Scott DeLoach, Anoop Singhal, Xinming Ou
Discussion of challenges and ways of improving Cyber Situational Awareness dominated our previous chapters. However, we have not yet touched on how to quantify any improvement we might achieve. Indeed, to get an accurate assessment of network security and

Natural Scene Statistics in Infrared Images

December 12, 2014
Author(s)
Nicholas G. Paulter Jr., Todd R. Goodall, Alan C. Bovik
Natural Scene Statistics (NSS) produces powerful perceptually relevant tools that have been highly successful in image quality analysis of visible light images. These NSS capture statistical regularities in the physical world and thus can be applicable to

Formalizing Software Bugs

December 8, 2014
Author(s)
Irena Bojanova
Knowing what makes a software systems vulnerable to attacks is critical, as software vulnerabilities hurt security, reliability, and availability of the system as a whole. In addition, understanding how an adversary operates is essential to effective cyber

Effective and Scalable Uncertainty Evaluation for Large-Scale Complex System Applications

December 7, 2014
Author(s)
Kevin L. Mills, James J. Filliben, Junfei Xie, Yan Wan, Yi Zhou, Yu Lei
Effective uncertainty evaluation is a critical step toward real-time and robust decision-making for complex systems in uncertain environments. A Multivariate Probabilistic Collocation Method (M-PCM) was developed to effectively evaluate system uncertainty

Cryptographic Module Validation Program (CMVP)

December 1, 2014
Author(s)
Apostol T. Vassilev, Larry Feldman, Gregory A. Witte
The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based standards

Flat lens criterion by small-angle phase

December 1, 2014
Author(s)
Peter Ott, Mohammed H. Al Shakhs, Henri Lezec, Kenneth J. Chau
It is sometimes possible to image using a flat lens consisting of planar, uniform media. There is conceptual division between theoretical flat lens proposals, which require exotic properties such as negative index or counter-intuitive behavior such as

Electrodermal Activity and Eye Movements Inform the Usability of Passwords

November 18, 2014
Author(s)
Jennifer R. Bergstrom, Kristen K. Greene, David C. Hawkins, Christian Gonzalez
While measuring physiological responses is a common practice in the field of neuroscience, it is rare in the usability arena and in password usability studies, in particular. This is unfortunate, as the use of such implicit measures could complement more

Classical simulation of Yang-Baxter gates

November 3, 2014
Author(s)
Stephen P. Jordan, Gorjan Alagic, Aniruddha Bapat
A unitary operator that satisfies the constant Yang-Baxter equation immediately yields a unitary representation of the braid group Bn for every n ≥ 2. If we view such an operator as a quantum-computational gate, then topological braiding corresponds to a

Optimal Deployment of Pico Base Stations in LTE-Advanced Heterogeneous Networks

October 29, 2014
Author(s)
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional

Spatial Computations over Terabyte-Sized Images on Hadoop Platforms

October 27, 2014
Author(s)
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady, Phuong Nguyen
Our objective is to lower the barrier of executing spatial image computations in a computer cluster/cloud environment instead of in a desktop/laptop computing environment. We research two related problems encountered during an execution of spatial

On Systemic Risk in the Cloud Computing Model

October 23, 2014
Author(s)
Vladimir V. Marbukh
The major benefits of the emerging cloud computing infrastructure include elimination of the fixed cost and reduction in the marginal cost for the users due to the economy of scale and dynamic resource sharing. This paper argues that these unquestionable

On Cascading Failures and Countermeasure based on Energy Storage in the Smart Grid

October 8, 2014
Author(s)
Xing Chen, Wei Yu, David W. Griffith, Nada T. Golmie, Guobin Xu, Chao Lu
Recently, there are growing concerns about smart grid security and resilience. The performance of smart grid may suffer from component failures or targeted attacks. A sophisticated adversary may target critical components in a smart grid, leading to

On Statistical Modeling and Forecasting of Energy Usage in Smart Grid

October 8, 2014
Author(s)
Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu
Developing effective energy resource management in the smart grid is challenging because the entities in both the demand and supply sides experience various uncertainties. This paper addresses the issue of quantifying uncertainties on the energy demand

Estimation of uncertainty in application profiles

October 3, 2014
Author(s)
David W. Flater
Performance is an important facet of software quality, and application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling
Displaying 651 - 675 of 2211