An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Machine learning (ML)-based Artificial Intelligence (AI) systems rely on training data to perform optimally, but the internal workings of how ML models learn from and use this data are often a black- box. Influence analysis provides valuable insights into
Krishna Khadka, Sunny Shree, Yu Lei, Raghu Kacker, David Kuhn
Machine Learning (ML) models rely on capturing important feature interactions to generate predictions. This study is focused on validating the hypothesis that model predictions often depend on interactions involving only a few features. This hypothesis is
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, David Kuhn, Raghu Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users
Marian Merritt, SUSAN HANSCHE, BRENDA ELLIS, Julie Nethery Snyder, KEVIN SANCHEZ-CHERRY, DONALD WALDEN
This publication provides guidance for federal agencies and organizations to develop and manage a life cycle approach to building a Cybersecurity and Privacy Learning Program (CPLP). The approach is intended to address the needs of large and small
This report focuses on the NIST-recommended block cipher modes of operation specified in NIST Special Publications (SP) 800-38A through 800-38F. The goal is to provide a concise survey of relevant research results about the algorithms and their
Repeat clickers refer to individuals who repeatedly fall prey to phishing at-tempts, posing a disproportionately higher risk to the organizations they inhabit. This study sought to explore the potential influence of three factors on repeat clicking
The Bugs Framework (BF) is a classification of security bugs and related faults, featuring a formal language for unambiguous specification of security weaknesses and underlined by them vulnerabilities. It organizes bugs and faults by the operations of
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross A. Leo, Anand Kumar Mishra, Nancy M. Landreville, Yien Wang
This document summarizes the research performed by the NIST Cloud Computing Forensic Science Working Group and presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA or FRA), whose goal is to provide support for a cloud system's forensic
Thomas Thurman, Asa Trainer, Allison Barnard Feeney, Rosemary Astheimer, Martin Hardwick, Mikael Hedlind
In the model-based enterprise (MBE) paradigm, enterprises are fueled by the digital thread, an authoritative, integrated information flow that connects all phases of the product life cycle. The digital thread enables use of data-driven processes to build
Abstract—In response to the looming crisis in global energy consumption required for advanced computing applications, the United States Department of Energy (DOE) Advanced Materials and Manufacturing Technology Office (AMMTO) is leading a national effort
In the dynamic landscape of cybersecurity, curated knowledge plays a pivotal role in empowering security analysts to respond effectively to cyber threats. Cyber Threat Intelligence (CTI) reports offer valuable insights into adversary behavior, but their
Whitney Quesenbery, Suzanne Chapman, Christopher Patten, Roberto Spreggiaro, Shanee Dawkins
One of the major issues for voting systems today is whether they provide voters with a meaningful opportunity to verify their ballot before casting it. This opportunity is important in helping them vote their intent by catching errors or omissions made
Qualitative research to gain deeper insights about how voters mark, review, verify, and cast their ballots. Conducted as part of the work to update the human factors—accessibility, privacy, and usability—requirements in federal voting system standards and
This paper presents a network management AI assistant built with Large Language Models. It adapts at runtime to the network state and specific platform, leveraging techniques like prompt engineering, document retrieval, and Knowledge Graph integration. The
As modern networks grow in complexity, ensuring their reliability and security becomes increasingly vital. Data plane analysis is a key process for verifying network behavior, but traditional data plane analysis tools face challenges in extensibility
Michael Dunaway, Thomas Roth, Edward Griffor, David A. Wollman
This document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division at the National Institute of Standards and Technology, an agency of the U.S
Jaganmohan Chandrasekaran, erin lanus, tyler cody, laura freeman, Raghu N. Kacker, M S Raunak, D. Richard Kuhn
The data-intensive nature of machine learning (ML)-enabled systems introduces unique challenges in test and evaluation. We present an overview of combinatorial coverage, exploring its applications across the ML-enabled system lifecycle and its potential to
Lan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
The advent of Large Language Models (LLMs) has enabled advancement in automated code generation, translation, and summarization. Despite their promise, evaluating the use of LLMs in repairing real-world code vulnerabilities remains underexplored. In this
Zineb Maasaoui, Abdella Battou, Mheni Merzouki, Ahmed LBATH
In the context of modern networks where cyber-attacks are increasingly complex and frequent, traditional Intrusion Detection Systems (IDS) often struggle to manage the vast volume of data and fail to detect novel attacks. Leveraging Artificial Intelligence
Benjamin Long, Guillaume Sousa Amaral, Philippe Dessauw, Hamza Bouhanni
The purpose of this paper is to reflect upon the Materials Genome Initiative (MGI) and our role as infrastructure developers within it. For context, we begin by considering a number of themes related to MGI activities such as modeling, design, building
Barry I. Schneider, Anthony J. Kearsley, Walid Keyrouz, Thomas C. Allison, chen qu
Graph neural networks have been successfully applied to machine learning models related to molecules and crystals, due to the similarity between a molecule/crystal and a graph. In this paper, we present three models that are trained with high-quality