Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 76 - 100 of 205

Deep reinforcement learning assisted energy harvesting wireless networks

May 24, 2021
Author(s)
Junliang Ye, Hamid Gharavi
Heterogeneous ultra-dense networking (HUDN) with energy harvesting technology is a promising approach to deal with the ever-growing traffic that can severely impact the power consumption of small-cell networks. Unfortunately, the amount of harvested energy

Atividades Fundamentais de Ciberseguranca para Fabricantes de Dispositivos IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os dispositivos da Internet das Coisas (IoT) muitas vezes não possuem recursos de segurança cibernética de acordo com os dispositivos que os seus clientes — organizações e indivíduos — querem usar para ajudar a mitigar riscos de segurança cibernética. Os

Linha de Base do Nucleo de Recursos de Ciberseguranca de Dispositivos IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os recursos de cibersegurança dos dispositivos são funções que os dispositivos de computação fornecem através dos seus próprios meios técnicos (ex: hardware e software do dispositivo). Esta publicação define uma linha de base dos recursos de cibersegurança

Referencia basica de las capacidades de ciberseguridad de los dispositivos de IoT

March 31, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Las capacidades de ciberseguridad de dispositivo son características o funciones de ciberseguridad que los dispositivos informáticos proporcionan por sus propios medios técnicos (es decir, el hardware y el software del dispositivo). Esta publicación define

Consideraciones para la gestion de riesgos a la ciberseguridad y la privacidad de internet de las cosas (IoT)

March 29, 2021
Author(s)
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas organizaciones no se dan cuenta del gran número de dispositivos de IoT que ya están utilizando

Consideracoes para Gerenciar Riscos de Privacidade e Seguranca Cibernetica na Internet das Coisas (IoT)

March 29, 2021
Author(s)
Katie Boeckl, Michael Fagan, Bill Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão necessariamente cientes do grande número de dispositivos IoT que já estão usando e como eles

Towards Deep Transfer Learning in Industrial Internet of Things

February 26, 2021
Author(s)
Xing Liu, Wei Yu, Fan Liang, David Griffith, Nada T. Golmie
In this paper, we propose a general framework to adopt transfer learning in IIoT systems. Transfer learning is a machine learning technique that fully uses the knowledge from pre- trained models to reduce the computing requirements for the training process

On Deep Reinforcement Learning Security for Industrial Internet of Things

February 15, 2021
Author(s)
Xing Liu, Wei Yu, Fan Liang, David W. Griffith, Nada T. Golmie
Industrial Internet of Things (IIoT), also known as Industry 4.0, empowers manufacturing and production processes by leveraging automation and Internet of Things (IoT) technologies. In IIoT, the information communication technologies enabled by IoT could

Merging Geospatial echnologies with cross reality in the context of smart manufacturing systems

December 16, 2020
Author(s)
Raffaele de Amicis, William Z. Bernstein, Johannes Scholz, Rafael Radkowski, Bruno Simoes, Joshua Lieberman, Eric Prather
It is widely acknowledged that geospatial information has immense applicability across a vast spectrum of human endeavors. Examples include oil and gas exploration, energy management, smart city engineering, weather forecasting, tracking, aviation

Towards Computing Resource Reservation Scheduling in Industrial Internet of Things

December 11, 2020
Author(s)
Fan Liang, Wei Yu, Xing Liu, David W. Griffith, Nada T. Golmie
The Industrial Internet of Things (IIoT) is a critically important implementation of the Internet of Things (IoT), connecting IoT devices ubiquitously in an industrial environment. Based on the interconnection of IoT devices, IIoT applications can collect

Smart Home Consumers' Privacy and Security Perceptions & Practices

December 7, 2020
Author(s)
Julie Haney, Susanne M. Furman, Yasemine Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack understanding of the privacy and security implications, while devices fail to provide transparency and

Research Report: User Perceptions of Smart Home Privacy and Security

November 17, 2020
Author(s)
Julie M. Haney, Susanne M. Furman, Yasemin Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, users may lack understanding of the privacy and security implications, while devices fail to provide transparency and

An Empirical Study on Flow-based Botnet Attacks Prediction

October 22, 2020
Author(s)
Mitsuhiro Hatada, Matthew A. Scholl
In the era of the Internet of Things, botnet threats are rising, which has prompted many studies on botnet detection and measurement. In contrast, this study aims to predict botnet attacks, such as massive spam emails and distributed denial-of-service

Cybersecurity Framework Version 1.1 Manufacturing Profile

October 7, 2020
Author(s)
Keith A. Stouffer, Timothy Zimmerman, CheeYee Tang, Michael Pease, Jeffrey Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the CSF can be used as a roadmap for reducing cybersecurity risk for manufacturers that

Adaptive Estimation of Near-Optimal Electrostatic Force in Micro Energy-Harvesters

September 28, 2020
Author(s)
Kamran Sayrafian, Masoud Roudneshin, Amir G. Aghdam
Recent advancements in micro-electronics have led to the development of miniature-sized wearable sensors that can be used for a variety of health monitoring applications. These sensors are typically powered by small batteries which could require frequent

Internet of Things (IoT) Component Capability Model for Research Testbed

September 17, 2020
Author(s)
Eric D. Simmon
Internet of Things (IoT) is the product of the worlds of information technology (IT) and operational technology (OT)converging. IoT combines the ability to observe the physical world with distributed computing systems that can combine and analyze the

Towards Usable Updates for Smart Home Devices

September 17, 2020
Author(s)
Julie M. Haney, Susanne M. Furman
Smart home device updates are important tools for users to remediate security vulnerabilities and protect devices from future attacks. However, no prior research has been conducted to understand smart home users' perceptions of and experiences with updates

On Data Integrity Attacks against Industrial Internet of Things

August 24, 2020
Author(s)
Hansong Xu, Wei Yu, Xing Liu, David W. Griffith, Nada T. Golmie
Industrial Internet of Things (IIoT) is predicted to drive the fourth industrial revolution through massive interconnection of industrial devices, such as sensors, controllers and actuators, integrating advances in smart machinery and data analytics driven

Deterministic Intra-Vehicle Communications: Timing and Synchronization

July 27, 2020
Author(s)
Hamid Gharavi
As we power through to the future, in-vehicle communications' reliance on speed is becoming a challenging predicament. This is mainly due to the ever-increasing number of electronic control units (ECUs), which will continue to drain network capacity, hence
Displaying 76 - 100 of 205