Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 101 - 125 of 2210

Handbook for VVSG 2.0 Usability and Accessibility Test Strategies

January 25, 2023
Author(s)
Whitney Quesenbery, Sharon J. Laskowski
This document provides guidance and resources for how to test voting systems against the usability and accessibility requirements in the Voluntary Voting System Guidelines (VVSG) 2.0. The requirements include Principles 2.2 and 5 through 8. The goal of

Ballot Definition Common Data Format Specification

January 24, 2023
Author(s)
Benjamin Long, John Dziurlaj
This publication describes a ballot definition common data format for the interchange of logical and physical ballot style information. It contains a UML (Unified Modeling Language) model of the election data and a JSON (JavaScript Object Notation) and XML

Micro Common Data Format Specification

January 23, 2023
Author(s)
Benjamin Long, John Dziurlaj
This specification describes a data format for space-constrained environments, such as the placement of machine readable data on paper. The specification is responsive to a need for interoperability in several key voting system scenarios in which the use

Network Security Traffic Analysis Platform - Design and Validation

January 20, 2023
Author(s)
Zineb Maasaoui, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, ahmed lbath, Veton KEPUSKA
Real-time traffic management and control have become necessary in today's networks due to their complexity and cybersecurity risks. With the increase in internet use, threats are more present and require real-time detection and analysis to prevent

What does the pixel measure?

January 11, 2023
Author(s)
David W. Flater
The pixel is often used as a unit of measurement in information technology. Unfortunately, there is not a simple, consistently-applicable answer to what it is a measure of. This report analyzes the pixel unit through the lens of metrology and shows how one

Photonic Online Learning: A Perspective

January 9, 2023
Author(s)
Sonia Buckley, Alexander Tait, Adam McCaughan, Bhavin Shastri
Neuromorphic systems promise to solve certain problems faster and with higher energy efficiency than traditional computing, by using the physics of the devices themselves for information processing. While initial results in photonic neuromorphic hardware

On Migrating ISO 10303 PMI Models to a Common Core

January 4, 2023
Author(s)
Allison Barnard Feeney, Thomas Thurman
Industrial users of ISO 10303 STandard for the Exchange of Product Model Data (STEP) protocols needed the ability to exchange design product data that is in conformance with recently updated ISO geometric product specification (GPS) standards, the American

Attacks on ML Systems: From Security Risk Analysis to Attack Mitigation

December 16, 2022
Author(s)
Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu
The past several years have witnessed rapidly increasing use of machine learning (ML) systems in multiple industry sectors. Since risk analysis is one of the most essential parts of the real-world ML system protection practice, there is an urgent need to

Integrated Sensing and Communication: Enabling Techniques, Applications, Tools and Datasets, Standardization, and Future Directions

December 1, 2022
Author(s)
Jian Wang, Neeraj Varshney, Camillo Gentile, Steve Blandino, Jack Chuang, Nada T. Golmie
The design of integrated sensing and communication (ISAC) systems has drawn recent attention for its capacity to solve a number of challenges. Indeed, ISAC can enable numerous benefits, such as the sharing of spectrum resources, hardware, and software, and

Task Offloading in Multi-tier Computing Systems towards Next-Generation Wireless Networks

December 1, 2022
Author(s)
Kunlun Wang, Jiong Jin, Yang Yang, Arumugam Nallanathan, Chintha Tellambura, Bijan Jabbari, Tao Zhang
With the development of next-generation wireless networks, the Internet of Things (IoT) is evolving towards the intelligent IoT (iIoT), where intelligent applications usually have stringent delay and jitter requirements. In order to provide lowlatency

Voices of First Responders: How to Facilitate Adoption and Usage of Communication Technology - An Integrated Analysis of Qualitative and Quantitative Findings

November 28, 2022
Author(s)
Yee-Yin Choong, Kerrianne Buchanan, Shanee Dawkins, Sandra Spickard Prettyman
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as

Efficient Parameter Exploration of Simulation Studies

November 18, 2022
Author(s)
Megan Olsen, M S Raunak
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of

Guide to a Secure Enterprise Network Landscape

November 17, 2022
Author(s)
Ramaswamy Chandramouli
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered

Using Business Impact Analysis to Inform Risk Prioritization and Response

November 17, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to provide a broad understanding of the potential impacts of any type of loss on the enterprise

Engineering Trustworthy Secure Systems

November 16, 2022
Author(s)
Ronald S. Ross, Mark Winstead, Michael McEvilley
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to

Advanced Persistent Threat Detection using Data Provenance and Metric Learning

November 14, 2022
Author(s)
Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, kangkook Jee
Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they

Intelligent-Fabric Computing: Challenges and Opportunities

November 8, 2022
Author(s)
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
With the advent of the Internet of Everything, people can easily interact with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience of carrying silicon-based entities and a lack of fine-grained
Displaying 101 - 125 of 2210