An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This paper investigates one type of social engineering scam, where unsuspecting users inadvertently consent to hidden financial obligations by performing routine online actions, such as making a purchase. Terms and conditions, often dense and overlooked
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP
Joanna DeFranco, Joshua Roberts, David Ferraiolo, Daniel Compton
Objective: To address database interoperability challenges to improve collaboration among disparate organizations. Materials and Methods: We developed a lightweight system to allow broad but well-controlled data sharing while preserving local data
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
A key question in software assurance is, "How much testing is enough?" Coverage criteria such as statement or branch coverage were developed to help answer this question, but we also need to measure whether tests are sufficiently representative of inputs
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides
NoSQL database systems and data stores often outperform traditional RDBMS in various aspects, such as data analysis efficiency, system performance, ease of deployment, flexibility/scalability of data management, and users' availability. However, with an
Kamal Choudhary, Daniel Wines, Kevin Garrity, aldo romero, Jaron Krogel, Kayahan Saritas, Panchapakesan Ganesh, Paul Kent, Pascal Friederich, Vishu Gupta, Ankit Agrawal, Pratyush Tiwary, ichiro takeuchi, Robert Wexler, Arun Kumar Mannodi-Kanakkithodi, Avanish Mishra, Kangming Li, Adam Biacchi, Francesca Tavazza, Ben Blaiszik, Jason Hattrick-Simpers, Maureen E. Williams
Reproducibility and validation are major hurdles for scientific development across many fields. Materials science in particular encompasses a variety of experimental and theoretical approaches that require careful benchmarking. Leaderboard efforts have
David Kuhn, M S Raunak, Raghu Kacker, Jaganmohan Chandrasekaran, Erin Lanus, Tyler Cody, Laura Freeman
Autonomous systems are proliferating rapidly, with strong interest in everything from vacuum cleaners and lawnmowers, to self-driving cars and autonomous farm equipment. Can these systems be trusted to function safely? Many conventional software
This paper proposes a distributed Green Network Optimization (GNO) with Multi-Agent Reinforcement Learning (MARL). GNO-MARL combines: (a) Network Utility Maximization (NUM) based network management, given the capacity constraints, on a "fast" time scale
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries. The primary digital signature scheme that
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.
Kamal Choudhary, Matthew Evans, Gian-Marco Rignanese
The Open Databases Integration for Materials Design (OPTIMADE) application programming interface (API) empowers users with holistic access to a growing federation of databases, enhancing the accessibility and discoverability of materials and chemical data
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network
This paper builds upon our previous work on Network Security Traffic Analysis Platforms (NSTAP) [1], presenting an advanced framework for the real-time monitoring of network traffic and endpoint security in large-scale enterprises. We employ a fully
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for autographing digital assets (associating one's name with a digital
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e. a seed drawn from any ramdom source with sufficient entropy. The current paper formalizes a security notion for a DRBG, allowing the attacker to
This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy verification and combinatorial methods for input space coverage measurement, which also has applications
Nicole Keller, Stephen Quinn, Matthew Barrett, Karen Scarfone, Matthew Smith, Vincent Johnson
The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships between elements of documents from cybersecurity
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O'Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The elements of an HSN may have
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to provide guidance concerning the threat of data
Attacks that target data are of concern to companies and organizations across many industries. Data breaches represent a threat that can have monetary, reputational, and legal impacts. This guide seeks to provide guidance around the threat of data breaches