DRAFTS

[1]
Barker E (2019) Recommendation for Cryptographic Key Generation. https://doi.org/10.6028/NIST.SP.800-133r1-draft
[2]
Barker E (2019) Recommendation for Key Management: Part 1 - General. https://doi.org/10.6028/NIST.SP.800-57pt1r5-draft
[3]
Barker E, Chen L, Davis R (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. https://doi.org/10.6028/NIST.SP.800-56Cr2-draft
[4]
Barker E, Kelsey J, McKay K, Roginsky A, Turan MS (2022) Recommendation for Random Bit Generator (RBG) Constructions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-90C 3pd, p NIST SP 800-90C 3pd. https://doi.org/10.6028/NIST.SP.800-90C.3pd
[5]
Barker E, Roginsky A, Davis R (2020) Recommendation for Cryptographic Key Generation. https://doi.org/10.6028/NIST.SP.800-133r2-draft
[6]
Barker WC, Scarfone K, Fisher W, Souppaya M (2021) Cybersecurity Framework Profile for Ransomware Risk Management. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8374-draft
[7]
Barker W, Polk W, Souppaya M (2020) Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms. https://doi.org/10.6028/NIST.CSWP.15.ipd
[8]
Barrett M, Keller N, Quinn S, Smith M, Scarfone K (2020) National Cybersecurity Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers. https://doi.org/10.6028/NIST.IR.8278A-draft
[9]
Bartock M (2020) Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. https://doi.org/10.6028/NIST.CSWP.14.ipd
[10]
Bartock M (2021) (Draft) Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. https://doi.org/10.6028/NIST.IR.8320-draft
[11]
Bartock M (2022) Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8323r1 ipd, p NIST IR 8323r1 ipd. https://doi.org/10.6028/NIST.IR.8323r1.ipd
[12]
Bartock M (2022) Hardware Enabled Security: Machine Identity Management and Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320C.ipd, p NIST IR 8320C.ipd. https://doi.org/10.6028/NIST.IR.8320C.ipd
[13]
Bartock M, Brule J, Li-Baboud Y-S, Lightman S, McCarthy J, Reczek K, Northrip D, Scholz A, Suloway T (2020) Cybersecurity Profile for the Responsible Use of Positioning, Navigation and Timing (PNT) Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8323-draft, p NIST IR 8323-draft. https://doi.org/10.6028/NIST.IR.8323-draft
[14]
Bartock M, Souppaya M, Savino R, Knoll T, Shetty U, Cherfaoui M, Yeluri R, Malhotra A, Banks D, Jordan M, Pendarakis D, Rao JR, Romness P, Scarfone K (2021) Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8320-draft2
[15]
Bartock M, Souppaya M, Wheeler J, Knoll T, Ramalingam M, Righi S (2023) Hardware Enabled Security: Hardware-Based Confidential Computing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320D ipd, p NIST IR 8320D ipd. https://doi.org/10.6028/NIST.IR.8320D.ipd
[16]
Bartock M, Souppaya M, Xia H, Yeluri R, Shetty U, Lum B, Sabath M, Singh H, Youssef A, Steinder G, Cao Y, Ramanathan J (2021) Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8320B-draft
[17]
Bojanova I (2024) Bug Framework (BF): Formalizing Cybersecurity Weaknesses and Vulnerabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-231 ipd, p NIST SP 800-231 ipd. https://doi.org/10.6028/NIST.SP.800-231.ipd
[18]
Booth H (2024) Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-218A ipd, p NIST SP 800-218A ipd. https://doi.org/10.6028/NIST.SP.800-218A.ipd
[19]
Boyens J (2021) (Draft) Supply Chain Risk Management Practices for Federal Information Systems and Organizations: Revision 1. https://doi.org/10.6028/NIST.SP.800-161r1-draft
[20]
Boyens J (2024) NIST Cybersecurity Framework 2.0: C-SCRM. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1306 ipd, p NIST SP 1306 ipd. https://doi.org/10.6028/NIST.SP.1306.ipd
[21]
Boyens JM (2020) Key Practices in Cyber Supply Chain Risk Management: Observations from Industry. https://doi.org/10.6028/NIST.IR.8276-draft
[22]
Boyens J, Smith A, Bartol N, Winkler K, Holbrook A, Fallon M (2021) Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-161r1-draft2
[23]
Brandao L, Davidson M (2022) Notes on Threshold EdDSA/Schnorr Signatures. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8214B ipd, p NIST IR 8214B ipd. https://doi.org/10.6028/NIST.IR.8214B.ipd
[24]
Brandão LTAN, Davidson M, Vassilev A (2019) Towards NIST Standards for Threshold Schemes for Cryptographic Primitives: A Preliminary Roadma. https://doi.org/10.6028/NIST.IR.8214A-draft
[25]
Buller D (2022) Discussion on the Full Entropy Assumption of the SP 800-90 Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8427 ipd, p NIST IR 8427 ipd. https://doi.org/10.6028/NIST.IR.8427.ipd
[26]
Butler JM (2022) Bitemark Analysis: A NIST Scientific Foundation Review. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8352-draft, p NIST IR 8352-draft. https://doi.org/10.6028/NIST.IR.8352-draft
[27]
Butler JM (2018) NIST Scientific Foundation Reviews. https://doi.org/10.6028/NIST.IR.8225-draft
[28]
Butler JM (2021) (Draft) DNA Mixture Interpretation: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8351-draft
[29]
Byers R, Waltermire D, Turner C (2020) National Vulnerability Database (NVD) Metadata Submission Guidelines for Common Vulnerabilities and Exposures (CVE) Numbering Authorities (CNAs) and Authorized Data Publishers. https://doi.org/10.6028/NIST.IR.8246-draft
[30]
Cawthra J (2020) Securing Data Integrity Against Ransomware Attacks: Using the NIST Cybersecurity Framework and NIST Cybersecurity Practice Guides. https://doi.org/10.6028/NIST.CSWP.17.ipd
[31]
Chandramouli R (2019) Security Strategies for Microservices-based Application Systems. https://doi.org/10.6028/NIST.SP.800-204-draft
[32]
Chandramouli R (2021) Implementation of DevSecOps for a Microservices-based Application with Service Mesh. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-204C-draft
[33]
Chandramouli R (2022) Guide to Secure Enterprise Network Access Landscape. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-215 ipd, p NIST SP 800-215 ipd. https://doi.org/10.6028/NIST.SP.800-215.ipd
[34]
Chandramouli R (2023) A Zero Trust Architecture Model for Access Control in Cloud Native Applications in Multi-Cloud Environments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-207A ipd, p NIST SP 800-207A ipd. https://doi.org/10.6028/NIST.SP.800-207A.ipd
[35]
Chandramouli R (2023) Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-204D ipd, p NIST SP 800-204D ipd. https://doi.org/10.6028/NIST.SP.800-204D.ipd
[36]
Chandramouli R (2024) A Data Protection Approach for Cloud-Native Applications. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8505 ipd, p NIST IR 8505 ipd. https://doi.org/10.6028/NIST.IR.8505.ipd
[37]
Chandramouli R, Butcher Z (2020) Building Secure Microservices-based Applications Using Service-Mesh Architecture. https://doi.org/10.6028/NIST.SP.800-204A-draft
[38]
Chandramouli R, Pinhas D (2020) Security Guidelines for Storage Infrastructure. https://doi.org/10.6028/NIST.SP.800-209-draft
[39]
Chen L (2021) Recommendation for Key Derivation Using Pseudorandom Functions, Revision 1 (Draft). https://doi.org/10.6028/NIST.SP.800-108r1-draft
[40]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 1 - General Implementation Guidance. https://doi.org/10.6028/NIST.IR.8183A-1-draft
[41]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 2 - Process-based Manufacturing System Use Case. https://doi.org/10.6028/NIST.IR.8183A-2-draft
[42]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 3 - Discrete-based Manufacturing System Use Case. https://doi.org/10.6028/NIST.IR.8183A-3-draft
[43]
Cooper DA (2019) Recommendation for Stateful Hash-Based Signature Schemes. https://doi.org/10.6028/NIST.SP.800-208-draft
[44]
Cuthill B (2024) Cybersecurity Requirements for Consumer-Grade Router Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425pt1 ipd, p NIST IR 8425pt1 ipd. https://doi.org/10.6028/NIST.IR.8425pt1.ipd
[45]
Cuthill B (2024) Recommended Cybersecurity Requirements for Consumer-Grade Router Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425A ipd, p NIST IR 8425A ipd. https://doi.org/10.6028/NIST.IR.8425A.ipd
[46]
Dang Q (2024) Recommendation for Additional Parameter Sets for the Stateless Hash-Based Digital Signature Scheme. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-230 ipd, p NIST SP 800-230 ipd. https://doi.org/10.6028/NIST.SP.800-230.ipd
[47]
Davidson M (2023) State Machine Replication and Consensus with Byzantine Adversaries. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8460 ipd, p NIST IR 8460 ipd. https://doi.org/10.6028/NIST.IR.8460.ipd
[48]
Dempsey K, Eavy P, Moore G, Takamura E (2019) Automation Support for Security Control Assessments: Software Vulnerability Management. https://doi.org/10.6028/NIST.IR.8011-4-draft
[49]
Dempsey K, Pillitteri V, Baer C, Rudman R, Niemeyer R, Urban S (2020) ISCMA: An Information Security Continuous Monitoring Program Assessment. https://doi.org/10.6028/NIST.IR.8212-draft
[50]
Dempsey K, Pillitteri VY, Baer C, Niemeyer R, Rudman R, Urban S (2020) Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment. https://doi.org/10.6028/NIST.SP.800-137A-draft
[51]
Dunaway M (2024) Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026: Smart City Infrastructure Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1900-207 ipd, p NIST SP 1900-207 ipd. https://doi.org/10.6028/NIST.SP.1900-207.ipd
[52]
Dworkin M (2019) Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. https://doi.org/10.6028/NIST.SP.800-38Gr1-draft
[53]
Fagan M (2020) IoT Device Cybersecurity Guidance for the Federal Government: An Approach for Establishing IoT Device Cybersecurity Requirements. https://doi.org/10.6028/NIST.SP.800-213-draft
[54]
Fagan M (2020) Profile of the IoT Core Baseline for the Federal Government. https://doi.org/10.6028/NIST.IR.8259B-draft
[55]
Fagan M (2022) Profile of the IoT Core Baseline for Consumer IoT Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425.ipd, p NIST IR 8425.ipd. https://doi.org/10.6028/NIST.IR.8425.ipd
[56]
Fagan M (2024) Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 33 ipd, p NIST CSWP 33 ipd. https://doi.org/10.6028/NIST.CSWP.33.ipd
[57]
Fagan M, Megas KN, Scarfone K, Smith M (2019) Core Cybersecurity Features Baseline for Securable IoT Devices: A Starting Point for IoT Device Manufacturers. https://doi.org/10.6028/NIST.IR.8259-draft
[58]
Fagan M, Megas KN, Scarfone K, Smith M (2020) Recommendations for IoT Device 2 Manufacturers: Foundational Activities and Core Device Cybersecurity 4 Capability Baseline. https://doi.org/10.6028/NIST.IR.8259-draft2
[59]
Fagan M, Yang M, Tan A, Randolph L, Scarfone K (2019) Security Review of Consumer Home 16 Internet of Things (IoT) Products. https://doi.org/10.6028/NIST.IR.8267-draft
[60]
Falco J, Van Wyk K, Messina E (2018) Performance Metrics and Test Methods for Robotic Hands. https://doi.org/10.6028/NIST.SP.1227-draft
[61]
Falco J, Van Wyk K, Messina E (2018) Proposed Standard Terminology for Robotic Hands and Associated Performance Metrics. https://doi.org/10.6028/NIST.SP.1229-draft
[62]
Ferraiolo H, Mehta K, Francomacaro S, Gupta S (2023) Interfaces for Personal Identity Verification: Part 1 – PIV Card Application Namespace, Data Model, and Representation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt1-5 ipd, p NIST SP 800-73pt1-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt1-5.ipd
[63]
Ferraiolo H, Mehta K, Francomacaro S, Chandramouli R, Gupta S (2023) Interfaces for Personal Identity Verification: Part 2 – PIV Card Application Card Command Interface. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt2-5 ipd, p NIST SP 800-73pt2-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt2-5.ipd
[64]
Ferraiolo H, Mehta K, Francomacaro S, Chandramouli R, Gupta S (2023) Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt3-5 ipd, p NIST SP 800-73pt3-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt3-5.ipd
[65]
Ferraiolo H, Regenscheid A (2023) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-78-5 ipd, p NIST SP 800-78-5 ipd. https://doi.org/10.6028/NIST.SP.800-78-5.ipd
[66]
Ferraiolo H, Regenscheid A, Fenton J (2023) Guidelines for Derived Personal Identity Verification (PIV) Credentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-157r1 ipd, p NIST SP 800-157r1 ipd. https://doi.org/10.6028/NIST.SP.800-157r1.ipd
[67]
Ferraiolo H, Regenscheid A, Gupta S, Ghadiali N (2023) Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-79r3 ipd, p NIST SP 800-79r3 ipd. https://doi.org/10.6028/NIST.SP.800-79r3.ipd
[68]
Ferraiolo H, Regenscheid A, Richer J (2023) Guidelines for Personal Identity Verification (PIV) Federation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-217 ipd, p NIST SP 800-217 ipd. https://doi.org/10.6028/NIST.SP.800-217.ipd
[69]
Fisher W (2021) (Draft) Using Mobile Device Biometrics for Authenticating First Responders. https://doi.org/10.6028/NIST.IR.8334-draft
[70]
Fisher W (2021) (Draft) Background on Identity Federation Technologies for the Public Safety Community. https://doi.org/10.6028/NIST.IR.8336-draft
[71]
Fisher W (2021) (Draft) Identity as a Service for Public Safety Organizations. https://doi.org/10.6028/NIST.IR.8335-draft
[72]
Foti J (2022) Advanced Encryption Standard (AES). (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 197 upd1 ipd, p NIST FIPS 197 upd1 ipd. https://doi.org/10.6028/NIST.FIPS.197-upd1.ipd
[73]
Franklin J (2018) Security Analysis of the Personal Area Network: The Future of Public Safety Technology. https://doi.org/10.6028/NIST.IR.8196-draft
[74]
Franklin JM, Howell G (2020) Guidelines for Managing the Security of Mobile Devices in the Enterprise. https://doi.org/10.6028/NIST.SP.800-124r2-draft
[75]
Galluzzo R (2023) Implementation Guidance for the VVSG 2.0: Multi-Factor Authentication. (National Institute of Standards and Technology, Gaithersburg, MD), NIST VTS 200-2 ipd, p NIST VTS 200-2 ipd. https://doi.org/10.6028/NIST.VTS.200-2.ipd
[76]
Garfnkel S (2022) De-Identifying Government Data Sets. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-188 3pd, p NIST SP 800-188 3pd. https://doi.org/10.6028/NIST.SP.800-188.3pd
[77]
Gilbert D (2024) NIST Cybersecurity Framework 2.0: Privacy Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1307 ipd, p NIST SP 1307 ipd. https://doi.org/10.6028/NIST.SP.1307.ipd
[78]
Grother P (2022) Face Recognition Vendor Test (FRVT) Part 8: Summarizing Demographic Differentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8429 ipd, p NIST IR 8429 ipd. https://doi.org/10.6028/NIST.IR.8429.ipd
[79]
Guo Y, Chandramouli R, Wofford L, Gregg R, Key G, Clark A, Hinton C, Prout A, Reuther A, Adamson R, Warren A, Bangalore P, Deumens E, Farkas C (2023) High Performance Computing (HPC) Security: Architecture and Security Posture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-223 ipd, p NIST SP 800-223 ipd. https://doi.org/10.6028/NIST.SP.800-223.ipd
[80]
Hawes D (2022) CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-140Br1 2pd, p NIST SP 800-140Br1 2pd. https://doi.org/10.6028/NIST.SP.800-140Br1.2pd
[81]
Hawes D, Calis A, Crombie R (2022) CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Br1.ipd
[82]
Herman M, Iorga M, Salim AM, Jackson R, Hurst M, Leo R, Mishra AK, Landreville N, Wang Y (2023) NIST Cloud Computing Forensic Reference Architecture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-201 ipd, p NIST SP 800-201 ipd. https://doi.org/10.6028/NIST.SP.800-201.ipd
[83]
Howell G (2020) Security Guidance for First Responder Mobile and Wearable Devices. https://doi.org/10.6028/NIST.IR.8235-draft
[84]
Hu VC (2020) General Access Control Guidance for Cloud Systems. https://doi.org/10.6028/NIST.SP.800-210-draft
[85]
Hu VC (2023) Overview and Considerations of Access Control Based on Attribute Encryption. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8450 ipd, p NIST IR 8450 ipd. https://doi.org/10.6028/NIST.IR.8450.ipd
[86]
Hu VC (2024) Access Control on NoSQL Databases. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8504 ipd, p NIST IR 8504 ipd. https://doi.org/10.6028/NIST.IR.8504.ipd
[87]
Hu VC (2019) Attribute Considerations for Access Control Systems. https://doi.org/10.6028/NIST.SP.800-205-draft
[88]
Hu VC (2021) Machine Learning for Access Control Policy Verification. https://doi.org/10.6028/NIST.IR.8360-draft
[89]
Hu VC (2021) Blockchain for Access Control Systems. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8403-draft
[90]
Joint Task Force (2020) Control Baselines for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53B-draft
[91]
JOINT TASK FORCE (2021) Assessing Security and Privacy Controls in Information Systems and Organizations (Draft). https://doi.org/10.6028/NIST.SP.800-53Ar5-draft
[92]
Joint Task Force Transformation Initiative (2020) Security and Privacy Controls for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53r5-draft
[93]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2020) National Cybersecurity Online Informative References (OLIR) Program: Guidance for OLIR Users and Developers. https://doi.org/10.6028/NIST.IR.8278-draft
[94]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2020) National Cybersecurity Online Informative References (OLIR) Program: Program Overview and OLIR Uses. https://doi.org/10.6028/NIST.IR.8278-draft2
[95]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2022) National Online Informative References (OLIR) Program: Overview, Benefits, and Use. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8278r1 ipd, p NIST IR 8278r1 ipd. https://doi.org/10.6028/NIST.IR.8278r1.ipd
[96]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2022) National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8278Ar1 ipd, p NIST IR 8278Ar1 ipd. https://doi.org/10.6028/NIST.IR.8278Ar1.ipd
[97]
Kuhn DR, Raunak MS, Kacker RN (2021) Combination Frequency Differencing. https://doi.org/10.6028/NIST.CSWP.22.ipd
[98]
Kuhn DR, Raunak MS, Kacker RN (2021) Combinatorial Coverage Difference Measurement. https://doi.org/10.6028/NIST.CSWP.19.ipd
[99]
LaSalle C, Howell G, Martinez L (2023) Cybersecurity for Research: Findings and Possible Paths Forward. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8481 ipd, p NIST IR 8481 ipd. https://doi.org/10.6028/NIST.IR.8481.ipd
[100]
Laskowski SJ (2021) (Draft) Promoting Access to Voting: Recommendations for Addressing Barriers to Private and Independent Voting for People with Disabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1273-draft, p NIST SP 1273-draft. https://doi.org/10.6028/NIST.SP.1273-draft
[101]
Lefkovitz N (2023) Guidelines for Evaluating Differential Privacy Guarantees. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-226 ipd, p NIST SP 800-226 ipd. https://doi.org/10.6028/NIST.SP.800-226.ipd
[102]
Lesavre L, Varin P, Yaga D (2020) Blockchain Networks: Token Design and Management Overview. https://doi.org/10.6028/NIST.IR.8301-draft
[103]
Lightman S, Suloway T, Brule J (2022) Satellite Ground Segment: Applying the Cybersecurity Framework to Assure Satellite Command and Control. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8401.ipd
[104]
Lyle JR, Guttman B, Butler JM, Sauerwein K, Reed C, Lloyd CE (2022) Digital Investigation Techniques: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8354-draft
[105]
Marron J (2021) Draft Election Infrastructure Profile. https://doi.org/10.6028/NIST.IR.8310-draft
[106]
Marron JA (2022) Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-66r2 ipd, p NIST SP 800-66r2 ipd. https://doi.org/10.6028/NIST.SP.800-66r2.ipd
[107]
McCarthy J, Mamula D, Brule J, Meldorf K (2022) Cybersecurity Profile for the Hybrid Satellite Networks (HSN) Cybersecurity DRAFT Annotated Outline. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 27 ipd, p NIST CSWP 27 ipd. https://doi.org/10.6028/NIST.CSWP.27.ipd
[108]
McCarthy J, Mamula D, Brule J, Meldorf K, Jennings R, Wiltberger J, Thorpe C, Dombrowski J, Lattin O (2023) Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN). (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8441 ipd, p NIST IR 8441 ipd. https://doi.org/10.6028/NIST.IR.8441.ipd
[109]
McCarthy J, Grayson N, Brule J, Cottle T, Dinerman A, Dombrowski J, Long J, Quigg K, Thompson M, Townsend A, Tran H, Urlaub N (2023) Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8473 ipd, p NIST IR 8473 ipd. https://doi.org/10.6028/NIST.IR.8473.ipd
[110]
Megas KN, Cuthill B, Gupta S (2021) Establishing Confidence in IoT Device Security: How do we get there? https://doi.org/10.6028/NIST.CSWP.18.ipd
[111]
Mell P (2022) Measuring the Common Vulnerability Scoring System Base Score Equation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8409.ipd, p NIST IR 8409.ipd. https://doi.org/10.6028/NIST.IR.8409.ipd
[112]
Mell P (2024) Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8517 ipd, p NIST IR 8517 ipd. https://doi.org/10.6028/NIST.IR.8517.ipd
[113]
Mell P, Yaga D (2022) Understanding Stablecoin Technology and Related Security Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8408 ipd, p NIST IR 8408 ipd. https://doi.org/10.6028/NIST.IR.8408.ipd
[114]
Merritt M, Hansche S, Ellis B, Sanchez-Cherry K, Snyder J, Walden D (2023) Building a Cybersecurity and Privacy Learning Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-50r1 ipd, p NIST SP 800-50r1 ipd. https://doi.org/10.6028/NIST.SP.800-50r1.ipd
[115]
Mouha N, Dworkin M (2023) Report on the Block Cipher Modes of Operation in the 800-38 Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8459 ipd, p NIST IR 8459 ipd. https://doi.org/10.6028/NIST.IR.8459.ipd
[116]
National Institute of Standards and Technology (2018) Return on investment initiative for unleashing American innovation. https://doi.org/10.6028/NIST.SP.1234-draft
[117]
National Institute of Standards and Technology (2019) Randomness Beacon Format 2.0. https://doi.org/10.6028/NIST.IR.8213-draft
[118]
National Institute of Standards and Technology (2019) Guide to IPsec VPNs: Revision 1. https://doi.org/10.6028/NIST.SP.800-77r1-draft
[119]
National Institute of Standards and Technology (2019) Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms, Revision 1. https://doi.org/10.6028/NIST.SP.800-175Br1-draft
[120]
National Institute of Standards and Technology (2019) A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. https://doi.org/10.6028/NIST.CSWP.9.ipd
[121]
National Institute of Standards and Technology (2020) Hardware-Enabled Security: Container Platform Security Prototype. https://doi.org/10.6028/NIST.IR.8320A-draft
[122]
National Institute of Standards and Technology (2023) The NIST Cybersecurity Framework 2.0. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 29 ipd, p NIST CSWP 29 ipd. https://doi.org/10.6028/NIST.CSWP.29.ipd
[123]
National Institute of Standards and Technology (2023) Module-Lattice-Based Digital Signature Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 204 ipd, p NIST FIPS 204 ipd. https://doi.org/10.6028/NIST.FIPS.204.ipd
[124]
National Institute of Standards and Technology (2023) Module-Lattice-Based Key-Encapsulation Mechanism Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 203 ipd, p NIST FIPS 203 ipd. https://doi.org/10.6028/NIST.FIPS.203.ipd
[125]
National Institute of Standards and Technology (2023) Stateless Hash-Based Digital Signature Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 205 ipd, p NIST FIPS 205 ipd. https://doi.org/10.6028/NIST.FIPS.205.ipd
[126]
National Institute of Standards and Technology (2023) Building a Metrology Exchange to Innovate in Semiconductors (METIS): A Vision for the CHIPS Metrology Program Data Exchange. (National Institute of Standards and Technology, Gaithersburg, MD), error: NIST CHIPS 1000-2 ipd, p error: NIST CHIPS 1000-2 ipd. https://doi.org/10.6028/NIST.CHIPS.1000-2.ipd
[127]
National Institute of Standards and Technology (2024) NIST Cybersecurity Framework 2.0: Cybersecurity Supply Chain Risk Management (C-SCRM) Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1305 ipd, p NIST SP 1305 ipd. https://doi.org/10.6028/NIST.SP.1305.ipd
[128]
National Institute of Standards and Technology (2024) NIST Cybersecurity Framework 2.0: Enterprise Risk Management Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1303 ipd, p NIST SP 1303 ipd. https://doi.org/10.6028/NIST.SP.1303.ipd
[129]
National Institute of Standards and Technology (2024) NIST Cybersecurity Framework 2.0: Quick-Start Guide for Using the CSF Tiers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1302 ipd, p NIST SP 1302 ipd. https://doi.org/10.6028/NIST.SP.1302.ipd
[130]
Nelson A (2024) Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-61r3 ipd, p NIST SP 800-61r3 ipd. https://doi.org/10.6028/NIST.SP.800-61r3.ipd
[131]
Newhouse W, Long J, Weitzel D, Warren J, Thompson M, Yates C, Tran H, Mink A, Herriott A, Cottle T (2022) Cybersecurity Framework Profile for Liquefied Natural Gas. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8406 ipd, p NIST IR 8406 ipd. https://doi.org/10.6028/NIST.IR.8406.ipd
[132]
Newhouse W, Souppaya M, Kent J, Sandlin K, Scarfone K (2023) Data Classification Concepts and Considerations for Improving Data Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8496 ipd, p NIST IR 8496 ipd. https://doi.org/10.6028/NIST.IR.8496.ipd
[133]
Nist GM (2024) Guide for Mapping Types of Information and Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-60r2 iwd, p NIST SP 800-60r2 iwd. https://doi.org/10.6028/NIST.SP.800-60r2.iwd
[134]
Nist GM (2024) NIST Cybersecurity Framework 2.0: Informative Reference Mapping Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1309 ipd, p NIST SP 1309 ipd. https://doi.org/10.6028/NIST.SP.1309.ipd
[135]
Nist GM (2024) NIST Cybersecurity Framework 2.0: Informative Reference Submission Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1312 ipd, p NIST SP 1312 ipd. https://doi.org/10.6028/NIST.SP.1312.ipd
[136]
Oprea A, Vassilev A (2023) Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI 100-2e2023 ipd, p NIST AI 100-2e2023 ipd. https://doi.org/10.6028/NIST.AI.100-2e2023.ipd
[137]
Pascoe C (2024) NIST Cybersecurity Framework 2.0: Generating a Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1304 ipd, p NIST SP 1304 ipd. https://doi.org/10.6028/NIST.SP.1304.ipd
[138]
Pascoe C, Nethery Snyder J, Scarfone K (2024) A Guide to Creating CSF 2.0 Community Profiles. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 32 ipd, p NIST CSWP 32 ipd. https://doi.org/10.6028/NIST.CSWP.32.ipd
[139]
Paulsen C, Boyens J, Ng J, Winkler K, Gimbi J (2020) Impact analysis tool for interdependent cyber supply chain risks. https://doi.org/10.6028/NIST.IR.8272-draft
[140]
Peralta R, Brandão LTAN (2023) NIST First Call for Multi-Party Threshold Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8214C ipd, p NIST IR 8214C ipd. https://doi.org/10.6028/NIST.IR.8214C.ipd
[141]
Petersen R, Santos D, Smith M, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). https://doi.org/10.6028/NIST.SP.800-181r1-draft
[142]
Phillips PJ, Hahn CA, Fontana PC, Broniatowski DA, Przybocki MA (2020) Four Principles of Explainable Artificial Intelligence. https://doi.org/10.6028/NIST.IR.8312-draft
[143]
Pillitteri V (2024) NIST Cybersecurity Framework 2.0: Risk Management Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1308 ipd, p NIST SP 1308 ipd. https://doi.org/10.6028/NIST.SP.1308.ipd
[144]
Pulivarti R (2023) Cybersecurity Framework Profile for Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8467 ipd, p NIST IR 8467 ipd. https://doi.org/10.6028/NIST.IR.8467.ipd
[145]
Pulivarti R, Martin N, Byers F, Wagner J, Zook J, Maragh S, Wilson K, Wojtyniak M, Kreider B, France A-M, Edwards S, Morris T, Shelton J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8432 ipd, p NIST IR 8432 ipd. https://doi.org/10.6028/NIST.IR.8432.ipd
[146]
Quinn S (2020) Advancing Cybersecurity and Enterprise Risk Management (ERM): Improving Communications and Risk Information Sharing Using the Risk Register. https://doi.org/10.6028/NIST.IR.8286-draft
[147]
Quinn S (2022) Using Business Impact Analysis to Inform Risk Prioritization and Response. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8286D.ipd, p NIST IR 8286D.ipd. https://doi.org/10.6028/NIST.IR.8286D.ipd
[148]
Quinn S, Ivy N, Barrett M, Witte G, Gardner RK (2022) Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8286C-draft
[149]
Quinn S, Ivy N, Chua J, Barrett M, Feldman L, Topper D, Witte G, Gardner R, Scarfone K (2022) Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-221 ipd, p NIST SP 800-221 ipd. https://doi.org/10.6028/NIST.SP.800-221.ipd
[150]
Quinn S, Ivy N, Chua J, Scarfone K, Barrett M, Feldman L, Topper D, Witte G, Gardner R (2022) Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-221A ipd, p NIST SP 800-221A ipd. https://doi.org/10.6028/NIST.SP.800-221A.ipd
[151]
Quinn S (2024) NIST Cybersecurity Framework 2.0: OLIR, How to do a Mapping. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1310 ipd, p NIST SP 1310 ipd. https://doi.org/10.6028/NIST.SP.1310.ipd
[152]
Regenscheid A (2019) Digital Signature Standard (DSS): Elliptic Curve Domain Parameters. https://doi.org/10.6028/NIST.FIPS.186-5-draft
[153]
Regenscheid A (2019) Recommendations for Discrete-Logarithm Based Cryptography: Elliptic Curve Domain Parameters. https://doi.org/10.6028/NIST.SP.800-186-draft
[154]
Rose S (2021) Planning for a Zero Trust Architecture: A Starting Guide for Administrators (Draft). https://doi.org/10.6028/NIST.CSWP.20.ipd
[155]
Rose S (2021) Developing Cyber Resilient Systems: A Systems Security Engineering Approach, Volume 2, Revision 1 (Draft). https://doi.org/10.6028/NIST.SP.800-160v2r1-draft
[156]
Rose S, Borchert O, Mitchell S, Connelly S (2019) Zero Trust Architecture. https://doi.org/10.6028/NIST.SP.800-207-draft
[157]
Rose S, Borchert O, Mitchell S, Connelly S (2020) Zero Trust Architecture. https://doi.org/10.6028/NIST.SP.800-207-draft2
[158]
Ross R (2020) Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171. https://doi.org/10.6028/NIST.SP.800-172-draft
[159]
Ross R (2022) (Draft) Engineering Trustworthy Secure Systems: Volume 1. https://doi.org/10.6028/NIST.SP.800-160v1r1-draft
[160]
Ross R, Pillitteri V (2023) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171r3 ipd, p NIST SP 800-171r3 ipd. https://doi.org/10.6028/NIST.SP.800-171r3.ipd
[161]
Ross R, Pillitteri V (2023) Assessing Security Requirements for Controlled Unclassified Information. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171Ar3 ipd, p NIST SP 800-171Ar3 ipd. https://doi.org/10.6028/NIST.SP.800-171Ar3.ipd
[162]
Ross R, Pillitteri V (2023) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171r3 fpd, p NIST SP 800-171r3 fpd. https://doi.org/10.6028/NIST.SP.800-171r3.fpd
[163]
Ross R, Pillitteri V, Dempsey K (2021) (Draft) Assessing Enhanced Security Requirements for Controlled Unclassified Information. https://doi.org/10.6028/NIST.SP.800-172A-draft
[164]
Ross R, Winstead M, McEvilley M (2022) Engineering Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-160v1r1 fpd, p NIST SP 800-160v1r1 fpd. https://doi.org/10.6028/NIST.SP.800-160v1r1.fpd
[165]
Scarfone K (2018) Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. https://doi.org/10.6028/NIST.IR.8228-draft
[166]
Scarfone K, Souppaya M (2023) Cybersecurity Log Management Planning Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-92r1 ipd, p NIST SP 800-92r1 ipd. https://doi.org/10.6028/NIST.SP.800-92r1.ipd
[167]
Scarfone K, Souppaya M, Fagan M (2023) Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8477 ipd, p NIST IR 8477 ipd. https://doi.org/10.6028/NIST.IR.8477.ipd
[168]
Schaffer K (2021) Ontology for Authentication. https://doi.org/10.6028/NIST.IR.8344-draft
[169]
Schaffer K (2021) (Draft) Recommendations for Federal Vulnerability Disclosure Guidelines. https://doi.org/10.6028/NIST.SP.800-216-draft
[170]
Schaffer K (2021) CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Fr1-draft
[171]
Schaffer K (2021) CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Cr1-draft
[172]
Schaffer K (2021) CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Dr1-draft
[173]
Schaffer K (2022) CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Cr1-draft2
[174]
Schaffer K (2022) CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Dr1-draft2
[175]
Scholl M (2021) (Draft) Introduction to Cybersecurity for Commercial Satellite Operations. https://doi.org/10.6028/NIST.IR.8270-draft
[176]
Scholl M, Suloway T (2022) Introduction to Cybersecurity for Commercial Satellite Operations. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8270-draft2
[177]
Schroeder K (2024) Measurement Guide for Information Security: Volume 1 — Identifying and Selecting Measures. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-55v1 ipd, p NIST SP 800-55v1 ipd. https://doi.org/10.6028/NIST.SP.800-55v1.ipd
[178]
Schroeder K (2024) Measurement Guide for Information Security: Volume 2 — Developing an Information Security Measurement Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-55v2 ipd, p NIST SP 800-55v2 ipd. https://doi.org/10.6028/NIST.SP.800-55v2.ipd
[179]
Schroeder K, Trinh H (2022) Performance Measurement Guide for Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-055r2 iwd, p NIST SP 800-055r2 iwd. https://doi.org/10.6028/NIST.SP.800-55r2.iwd
[180]
Schwartz R, Down L, Jonas A, Tabassi E (2021) A Proposal for Identifying and Managing Bias in Artificial Intelligence. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.1270-draft
[181]
Souppaya M (2020) Methodology for Characterizing Network Behavior of Internet of Things Devices. https://doi.org/10.6028/NIST.CSWP.12.ipd
[182]
Souppaya M, Scarfone K (2021) Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-40r4-draft
[183]
Souppaya M, Scarfone K, Dodson D (2021) Secure Software Development Framework (SSDF) Version 1.1: (Draft): Recommendations for Mitigating the Risk of Software Vulnerabilities. https://doi.org/10.6028/NIST.SP.800-218-draft
[184]
Sriram K (2018) Secure Interdomain Traffic Exchange. https://doi.org/10.6028/NIST.SP.800-189-draft
[185]
Sriram K, Montgomery D (2019) Resilient Interdomain Traffic Exchange: 3 BGP Security and DDoS Mitigation. https://doi.org/10.6028/NIST.SP.800-189-draft2
[186]
Stanton B, Jensen T (2021) Trust and Artificial Intelligence. https://doi.org/10.6028/NIST.IR.8332-draft
[187]
Stine K (2021) Prioritizing Cybersecurity Risk for Enterprise Risk Management (Draft). https://doi.org/10.6028/NIST.IR.8286B-draft
[188]
Stine K, Quinn S, Ivy N, Feldman L, Witte G, Gardner RK (2021) Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM). (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8286A-draft2
[189]
Stine K, Quinn S, Witte G, Gardner RK (2020) Integrating Cybersecurity and Enterprise Risk Management (ERM). https://doi.org/10.6028/NIST.IR.8286-draft2
[190]
Stouffer K, Pease M, Tang C, Zimmerman T, Pillitteri V, Lightman S (2022) Guide to Operational Technology (OT) Security: Initial Public Draft. https://doi.org/10.6028/NIST.SP.800-82r3.ipd
[191]
Stouffer K, Zimmerman T, Tang C, Lubell J, Cichonski J, Pease M, McCarthy J (2020) Cybersecurity Framework Version 1.1 Manufacturing Profile. https://doi.org/10.6028/NIST.IR.8183r1-draft
[192]
Symington S, Polk W, Souppaya M (2020) Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management (Draft). https://doi.org/10.6028/NIST.CSWP.16.ipd
[193]
Tabassi E, Burns KJ, Hadjimichael M, Molina-Markham AD, Sexton JT (2019) A taxonomy and terminology of adversarial machine learning. https://doi.org/10.6028/NIST.IR.8269-draft
[194]
Tang C (2024) Water and Wastewater Project Architecture: Industrial Control System Remote Access. (National Institute of Standards and Technology, Gaithersburg, MD), NIST TN 2283 ipd, p NIST TN 2283 ipd. https://doi.org/10.6028/NIST.TN.2283.ipd
[195]
Temoshok D, Abruzzi C, Choong Y-Y, Fenton J, Galluzzo R, LaSalle C, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines: Enrollment and Identity Proofing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63A-4 ipd, p NIST SP 800-63A-4 ipd. https://doi.org/10.6028/NIST.SP.800-63A-4.ipd
[196]
Temoshok D, Fenton J, Choong Y-Y, Lefkovitz N, Regenscheid A, Richer J (2022) Digital Identity Guidelines: Authentication and Lifecycle Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63B-4 ipd, p NIST SP 800-63B-4 ipd. https://doi.org/10.6028/NIST.SP.800-63B-4.ipd
[197]
Temoshok D, Proud-Madruga D, Choong Y-Y, Galluzzo R, Gupta S, LaSalle C, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-063-4 ipd, p NIST SP 800-063-4 ipd. https://doi.org/10.6028/NIST.SP.800-63-4.ipd
[198]
Temoshok D, Richer J, Choong Y-Y, Fenton J, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines: Federation and Assertions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63C-4 ipd, p NIST SP 800-63C-4 ipd. https://doi.org/10.6028/NIST.SP.800-63C-4.ipd
[199]
Trapnell M, Trapnell E, Souppaya M, Gendler B, Scarfone K (2022) Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-219-draft
[200]
Trapnell M, Trapnell E, Souppaya M, Gendler B, Scarfone K (2023) Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-219r1 ipd, p NIST SP 800-219r1 ipd. https://doi.org/10.6028/NIST.SP.800-219r1.ipd
[201]
Voas J (2021) (Draft) Considerations for Digital Twins Standards. https://doi.org/10.6028/NIST.IR.8356-draft
[202]
Voas J (2022) (Draft) Cybersecurity Considerations for Open Banking Technology and Emerging Standards. https://doi.org/10.6028/NIST.IR.8389-draft
[203]
Watrobski P, Souppaya M, Klosterman J, Barker W (2022) Methodology for Characterizing Network Behavior of Internet of Things Devices. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8349-draft
[204]
Wetzel K (2021) Draft NICE Framework Competencies. https://doi.org/10.6028/NIST.IR.8355-draft
[205]
Wetzel KA (2021) NICE Framework Competencies: Assessing Learners for Cybersecurity Work. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8355-draft2
[206]
National Institute of Standards                    and Technology (2020) Personal Identity Verification (PIV) of Federal Employees and Contractors. https://doi.org/10.6028/NIST.FIPS.201-3-draft
[207]
National Institute of Standards                    and Technology (2020) Foundational Cybersecurity Activities for IoT Device Manufacturers C. https://doi.org/10.6028/NIST.IR.8259C-draft
[208]
National Institute of Standards                    and Technology (2020) Foundational Cybersecurity Activities for IoT Device Manufacturers D. https://doi.org/10.6028/NIST.IR.8259D-draft
[209]
National Institute of Standards                    and Technology (2020) Integrating Cybersecurity and Enterprise Risk Management (ERM) A. https://doi.org/10.6028/NIST.IR.8286A-draft
[210]
National Institute of Standards                    and Technology (2021) Attribute-based Access Control for Microservices-based Applications Using a Service Mes. https://doi.org/10.6028/NIST.SP.800-204B-draft
[211]
National Institute of Standards                    and Technology (2021) Managing the Security of Information Exchanges. https://doi.org/10.6028/NIST.SP.800-47r1-draft