Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 2210

Poisoning Attacks against Machine Learning: Can Machine Learning be Trustworthy?

October 24, 2022
Author(s)
Alina Oprea, Anoop Singhal, Apostol Vassilev
Many practical applications benefit from Machine Learning (ML) and Artificial Intelligence (AI) technologies, but their security needs to be studied in more depth before the methods and algorithms are actually deployed in critical settings. In this article

Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting

October 25, 2022
Author(s)
Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sonmez Turan
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: \ascon-128 (primary)

Privacy policies robustness to reverse engineering

October 21, 2022
Author(s)
A. Gilad Kusne
Differential privacy policies allow one to preserve data privacy while sharing and analyzing data. However, these policies are susceptible to an array of attacks. In particular, often a portion of the data desired to be privacy protected is exposed online

Can You Spot a Phish

October 19, 2022
Author(s)
Shanee Dawkins, Jody Jacobs
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss the NIST Phish Scale, our research on why users click, and how it can help users spot a phish.

AI Assurance for the Public -- Trust but Verify, Continuously

October 3, 2022
Author(s)
Phillip Laplante, D. Richard Kuhn
Artificial intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land vehicles, autonomous aircraft, medical systems and financial systems. AI systems should equal or surpass human performance, but given

The Industrial Ontologies Foundry (IOF) Core Ontology

September 19, 2022
Author(s)
Boonserm Kulvatunyou, Milos Drobnjakovic, Farhad Ameri, Chris Will, Barry Smith
The Industrial Ontologies Foundry (IOF) has been formed to create a suite of interoperable ontologies that would serve as a foundation for data and information interoperability in all areas of manufacturing. To ensure that the ontologies are developed in a

Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight

September 14, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides additional details regarding the enterprise application of

Digital Evidence Preservation: Considerations for Evidence Handlers

September 8, 2022
Author(s)
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to the preservation of digital evidence. This document is part of a series on evidence management

Gap Analysis for Key Interoperability Scenarios in Election Technology

August 1, 2022
Author(s)
John Dziurlaj, Benjamin Long
This document describes potential use-cases for data interoperability in election technology components not previously considered in past efforts. Such components include on-demand ballot printing systems, remote ballot marking systems and electronic poll

Recommendations for Voting System Interoperability

August 1, 2022
Author(s)
John Dziurlaj, Benjamin Long
There is currently no common data format for ballot styles and associated use-cases. This white paper investigates this and other potential interoperability gaps within the voting system in a holistic manner, by considering previous voting interoperability

Knowledge Mining in Cybersecurity: From Attack to Defense

July 18, 2022
Author(s)
Khandakar Ashrafi Akbar, Sadaf MD Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham
In the fast-evolving world of Cybersecurity, an analyst often has the difficult task of responding to new threats and attack campaigns within a limited amount of time. If an analyst fails to do so, this can lead to severe consequences for the system under

What Makes a Good Podcast Summary?

July 11, 2022
Author(s)
Rezvaneh Rezapour, Sravana Reddy, Rosie Jones, Ian Soboroff
Abstractive summarization of podcasts is motivated by the growing popularity of podcasts and the needs of their listeners. Podcasting is a markedly different domain from news and other media that are commonly studied in the context of automatic

Measurement Challenges for Scaling Superconductor-based Quantum Computers

June 23, 2022
Author(s)
Pete Hopkins, Manuel Castellanos Beltran, John Biesecker, Paul Dresselhaus, Anna Fox, Logan Howe, David Olaya, Adam Sirois, Dylan Williams, Samuel P. Benz, Alirio De Jesus Soares Boaventura, Justus Brevik
Global investment in the research and development of quantum information systems by industry, government, and academic institutions continues to accelerate and is expected to reach over $16B by 2027 [1]. Systems based on optical photons, atoms or ions
Displaying 126 - 150 of 2210