An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In digital forensics, file system analysis is a precursor task to event reconstruction. Often, unallocated content within a file system is content of interest to an investigation, and thus recognition, extraction, and ascription of unallocated files are
Ramaswamy Chandramouli, Frederick Kautz, Santiago Torres-Arias
The predominant application architecture for cloud-native applications consists of multiple microservices, accompanied in some instances by a centralized application infrastructure, such as a service mesh, that provides all application services. This class
We present UniSpec, an attention-driven deep neural network designed to predict comprehensive collision-induced fragmentation spectra, thereby improving peptide identification in shotgun proteomics. Utilizing a training data set of 1.8 million unique high
Felix Adams, Austin McDannald, Ichrio Takeuchi, A. Gilad Kusne
Autonomous experimentation achieves user objectives more efficiently than Edisonian studies by combining machine learning and laboratory automation to iteratively select and perform experiments. Integrating knowledge from theory, simulations, literature
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is an approach where test suites are developed by efficiently covering interactions of parameter values and configuration settings. Multiple studies over the years have shown the interesting phenomenon where almost all defects in a
The Artificial Intelligence Risk Management Framework (AI RMF) produced by the National Institute of Standards and Technology (NIST) is a voluntary resource for organizations to manage the risks posed by AI technologies to individuals, communities, society
Joanna DeFranco, David Ferraiolo, Joshua Roberts, D. Richard Kuhn
Sharing data among disparate organizations can be extremely difficult, when the data comes from different database management systems (DBMS). Most problematic is that data stored at another organization most likely uses different DBMS schemas and
The current state of the art in software security -- describing weaknesses as CWEs, vulnerabilities as CVEs, and labeling CVEs with CWEs -- is not keeping up with the modern cybersecurity research and application requirements for comprehensively labeled
Hakju Oh, Boonserm Kulvatunyou, Albert T. Jones, Tim Finin
Today, businesses rely on numerous information systems to achieve their production goals and improve their global competitiveness. Semantically integrating those systems is essential for businesses to achieve both. To do so, businesses must rely on
Ronald Pulivarti, Natalia Martin, Frederick R. Byers, Justin Wagner, Justin Zook, Samantha Maragh, Jennifer McDaniel, Kevin Wilson, Martin Wojtyniak, Brett Kreider, Ann-Marie France, Sallie Edwards, Tommy Morris, Jared Sheldon, Scott Ross, Phillip Whitlow
Genomic data has enabled the rapid growth of the U.S. bioeconomy and is valuable to the individual, industry, and government because it has multiple intrinsic properties that in combination make it different from other types of high value data which
Encryption technology can be incorporated into access control mechanisms based on user identities, user attributes, or resource attributes. Traditional public-key encryption requires different data to have different keys that can be distributed to users
Ashrafi Akbar, Fariha Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuriasingham
Ontology enables semantic interoperability, making it highly valuable for cyber threat hunting. Community-driven frameworks like MITRE ATT&CK, D3FEND, ENGAGE, CWE and CVE have been developed to combat cyber threats. However, manually navigating these
Eduardo Takamura, Jeremy Licata, Victoria Yan Pillitteri
In 2017, NIST published a methodology for supporting the automation of SP 800-53 control assessments in the form of IR 8011. IR 8011 is a multi-volume series that starts with an overview of the methodology (volume 1) and provides guidance and
This document is the second part of a series of documents on the usability of electronic pollbooks. It contains a procedure for how e-pollbooks might be evaluated, including a preliminary protocol for running a usability test. It can be used by people
This publication is a report on the exploration of the use of electronic pollbooks (e-pollbooks) in elections. The scope of this report is on usability and accessibility of e-pollbooks, that is, their use by poll workers and voters, rather than on
Edward Griffor, Matthew Bundas, Chasity Nadeau, Jeannine Shantz, Thanh Nguyen, Marcello Balduccini, Tran Son
Artificial Intelligence (AI) is often critical to the success of modern business processes. Leveraging it, however, is non-trivial. A major hurdle is communication: discussing system requirements among stakeholders with different backgrounds and goals
Yeun Park, Paul Witherell, Albert T. Jones, Hyunbo Cho
As a multi-staged digital manufacturing process, Additive manufacturing (AM) inherently benefits from data analytics (DA) decision-making opportunities. The abundance of data associated with the various observations and measurements taken throughout the
Data-driven research in Additive Manufacturing (AM) has gained significant success in recent years. This has led to a plethora of scientific literature to emerge. The knowledge in these works consists of AM and Artificial Intelligence (AI) contexts that
Stephen Quinn, Nahla Ivy, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Karen Scarfone, Robert Gardner, Julie Chua
All enterprises should ensure that information and communications technology (ICT) risk receives appropriate attention within their enterprise risk management (ERM) programs. This document is intended to help individual organizations within an enterprise
Stephen Quinn, Nahla Ivy, Karen Scarfone, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Robert Gardner, Julie Chua
The increasing frequency, creativity, and severity of technology attacks means that all enterprises should ensure that information and communications technology (ICT) risk is receiving appropriate attention within their enterprise risk management (ERM)
Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu
While network attacks play a critical role in many advanced persistent threat (APT) campaigns, an arms race exists between the network defenders and the adversary: to make APT campaigns stealthy, the adversary is strongly motivated to evade the detection
The phishing cyber threat exploits vulnerabilities in the U.S. and around the world across private and public sectors. Embedded phishing awareness training programs, where simulated phishing emails are sent to employees, are designed to prepare employees
Motivation: Software security vulnerabilities are leveraged to attack cyberspace and critical infrastructure, leading to security failures. When communicating about them, however, even security experts might conflate essential related software concepts
Motivation: Crucial need of a formal classification system allowing unambiguous specification of software security bugs and weaknesses, and the vulnerabilities that exploit them. Objective: Create bug models, weakness taxonomies, and vulnerability models