U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1201 through 1225 of 13539 matching records.
Publications SP 1500-4r2 October 21, 2019
https://csrc.nist.rip/publications/detail/sp/1500-4r2/final

Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is outpacing scientific and technological advances...

Publications Conference Proceedings October 14, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/10/14/automated-unified-framework-combinatorial-interaction-testing

Conference: Evaluation and Assessment in Software Engineering (EASE) Abstract: Combinatorial interaction testing (CIT) is a well-known technique, but industrial experience is needed to determine its effectiveness in different application domains. We present a case study introducing a unified framework for generating, executing and verifying CIT test suites, based on the open-s...

Publications SP 800-128 October 10, 2019
https://csrc.nist.rip/publications/detail/sp/800-128/final

Abstract: The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems and associated environments of operation. Configur...

Publications White Paper (Draft) October 8, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/10/08/improving-cybersecurity-of-managed-service-providers/draft

Abstract: MSPs have become an attractive target for cyber criminals. As a result, an MSP could benefit from improving its own cybersecurity through implementing a secure IT architecture that reduces vulnerabilities to attacks such as ransomware. When an MSP is vulnerable to a cyber attack, it also increases t...

Publications NISTIR 8268 October 7, 2019
https://csrc.nist.rip/publications/detail/nistir/8268/final

Abstract: The National Institute of Standards and Technology (NIST) is in the process of selecting one or more authenticated encryption and hashing schemes suitable for constrained environments through a public, competition-like process. In February 2019, 57 candidate algorithms were submitted to NIST for con...

Publications NISTIR 8267 (Draft) October 1, 2019
https://csrc.nist.rip/publications/detail/nistir/8267/draft

Abstract: This report presents the results of a project that conducted a technical review of security features in different categories of consumer home Internet-of-Things (IoT) devices. The categories of IoT devices included smart light bulbs, security lights, security cameras, doorbells, plugs, thermostats,...

Publications NISTIR 8183A Vol. 1 September 30, 2019
https://csrc.nist.rip/publications/detail/nistir/8183a/vol-1/final

Abstract: This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CS...

Publications NISTIR 8183A Vol. 2 September 30, 2019
https://csrc.nist.rip/publications/detail/nistir/8183a/vol-2/final

Abstract: This guide provides example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in process-based manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impa...

Publications NISTIR 8183A Vol. 3 September 30, 2019
https://csrc.nist.rip/publications/detail/nistir/8183a/vol-3/final

Abstract: This guide provides example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in discrete-based manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Sec...

Publications Journal Article September 24, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/can-deep-learning-save-us-and-itself-from-avalanche-of-threats

Journal: Computer (IEEE Computer) Abstract: I present a computationally efficient and accurate feedforward neural network for sentiment prediction capable of maintaining high transfer accuracy when coupled with an effective semantics model of the text. Experimental results show the advantages of the new approach. Applications to security vali...

Publications Conference Proceedings September 10, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/09/10/bowtie-deep-learning-feedforward-neural-network-for-sa

Conference: International Conference on Machine Learning, Optimization, and Data Science Abstract: How to model and encode the semantics of human-written text and select the type of neural network to process it are not settled issues in sentiment analysis. Accuracy and transferability are critical issues in machine learning in general. These properties are closely related to the loss estimates fo...

Publications Journal Article September 1, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/optimizing-network-diversity

Journal: Computer Communications Abstract: Diversity as a security mechanism is receiving renewed interest due to its potential for improving the resilience of software and networks against previously unknown attacks. Recent works show diversity can be modeled and quantified as a security metric at the network level. However, such efforts do...

Publications SP 800-52 Rev. 2 August 29, 2019
https://csrc.nist.rip/publications/detail/sp/800-52/rev-2/final

Abstract: Transport Layer Security (TLS) provides mechanisms to protect data during electronic dissemination across the Internet. This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Federal Information Processing Standards...

Publications SP 1800-12 August 27, 2019
https://csrc.nist.rip/publications/detail/sp/1800-12/final

Abstract: Federal Information Processing Standards (FIPS) Publication 201-2, “Personal Identity Verification (PIV) of Federal Employees and Contractors,” establishes a standard for a PIV system based on secure and reliable forms of identity credentials issued by the federal government to its employees and con...

Publications Conference Proceedings August 26, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/08/26/knowledge-extraction-for-crypto-alg-validation-test-vectors

Conference: International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE) Abstract: We present a combinatorial coverage measurement analysis for test vectors provided by the NIST Cryptographic Algorithm Validation Program (CAVP), and in particular for test vectors targeting the AES block ciphers for different key sizes and cryptographic modes of operation. These test vectors are me...

Publications Journal Article August 17, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/upper-bounds-on-the-multiplicative-complexity

Journal: Cryptography and Communications Abstract: A special metric of interest about Boolean functions is multiplicative complexity (MC): the minimum number of AND gates sufficient to implement a function with a Boolean circuit over the basis {XOR, AND, NOT}. In this paper we study the MC of symmetric Boolean functions, whose ou...

Publications White Paper August 15, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/08/15/securing-the-iiot-cybersecurity-for-distributed-energy-resources/final

Abstract: This project explores several scenarios in which information exchanges among commercial- and utility-scale distributed energy resources (DERs) and electric distribution grid operations can be protected from certain cybersecurity compromises. Components of these infrastructures form what is commonly...

Publications Conference Paper August 11, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/08/11/perceptions-of-smart-home-privacy-and-security

Conference: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) Abstract: Smart home devices are increasingly being used by nontechnical users who have little understanding of the technology, including privacy and security implications. To better understand perceptions of smart home privacy and security, we are conducting an interview study of individuals living in smart...

Publications Conference Paper August 11, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/08/11/security-awareness-in-action-a-case-study

Conference: 5th Workshop on Security Information Workers (WSIW 2019) Abstract: The in-progress case study will allow for examination of a security awareness team from several perspectives via a multi-faceted approach involving: 1) interviews of security awareness team members, managers in the team’s chain-of-command, and agency employees who receive the security awareness...

Publications SP 1800-7 August 7, 2019
https://csrc.nist.rip/publications/detail/sp/1800-7/final

Abstract: Through direct dialogue between NCCoE staff and members of the energy sector (composed mainly of electric power companies and those who provide equipment and/or services to them) it became clear that energy companies need to create and maintain a high level of visibility into their operating environ...

Publications SP 800-204 August 7, 2019
https://csrc.nist.rip/publications/detail/sp/800-204/final

Abstract: Microservices architecture is increasingly being used to develop application systems since its smaller codebase facilitates faster code development, testing, and deployment as well as optimization of the platform based on the type of microservice, support for independent development teams, and the a...

Publications SP 800-162 August 2, 2019
https://csrc.nist.rip/publications/detail/sp/800-162/final

Abstract: This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, i...

Publications SP 1800-17 July 30, 2019
https://csrc.nist.rip/publications/detail/sp/1800-17/final

Abstract: As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale (POS) security measures, there have been increases in fraudulent online card-not-present electronic commerce (e-commerce) transactions. The risk of increased fraudulent o...

Publications Conference Proceedings July 30, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/07/30/oscal-schema-and-metaschema

Conference: Balisage: The Markup Conference 2019 Abstract: The Information Technology Lab at NIST is developing technical standards for documentation related to systems security. The Open Security Controls Assessment Language (OSCAL) defines lightweight schemas, along with related infrastructure, for tagging system security information to support routine ta...

Publications White Paper July 18, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/07/18/practical-cryptanalysis-of-k-ary-c/final

Abstract: Recently, an article by Felke appeared in Cryptography and Communications discussing the security of biquadratic C* and a further generalization, k-ary C*. The article derives lower bounds for the complexity of an algebraic attack, directly inverting the public key, under an assumption that the firs...

<< first   < previous   37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60     61  next >  last >>