|
|
*.7z filter=lfs diff=lfs merge=lfs -text |
|
|
*.arrow filter=lfs diff=lfs merge=lfs -text |
|
|
*.bin filter=lfs diff=lfs merge=lfs -text |
|
|
*.bz2 filter=lfs diff=lfs merge=lfs -text |
|
|
*.ckpt filter=lfs diff=lfs merge=lfs -text |
|
|
*.ftz filter=lfs diff=lfs merge=lfs -text |
|
|
*.gz filter=lfs diff=lfs merge=lfs -text |
|
|
*.h5 filter=lfs diff=lfs merge=lfs -text |
|
|
*.joblib filter=lfs diff=lfs merge=lfs -text |
|
|
*.lfs.* filter=lfs diff=lfs merge=lfs -text |
|
|
*.lz4 filter=lfs diff=lfs merge=lfs -text |
|
|
*.mds filter=lfs diff=lfs merge=lfs -text |
|
|
*.mlmodel filter=lfs diff=lfs merge=lfs -text |
|
|
*.model filter=lfs diff=lfs merge=lfs -text |
|
|
*.msgpack filter=lfs diff=lfs merge=lfs -text |
|
|
*.npy filter=lfs diff=lfs merge=lfs -text |
|
|
*.npz filter=lfs diff=lfs merge=lfs -text |
|
|
*.onnx filter=lfs diff=lfs merge=lfs -text |
|
|
*.ot filter=lfs diff=lfs merge=lfs -text |
|
|
*.parquet filter=lfs diff=lfs merge=lfs -text |
|
|
*.pb filter=lfs diff=lfs merge=lfs -text |
|
|
*.pickle filter=lfs diff=lfs merge=lfs -text |
|
|
*.pkl filter=lfs diff=lfs merge=lfs -text |
|
|
*.pt filter=lfs diff=lfs merge=lfs -text |
|
|
*.pth filter=lfs diff=lfs merge=lfs -text |
|
|
*.rar filter=lfs diff=lfs merge=lfs -text |
|
|
*.safetensors filter=lfs diff=lfs merge=lfs -text |
|
|
saved_model/**/* filter=lfs diff=lfs merge=lfs -text |
|
|
*.tar.* filter=lfs diff=lfs merge=lfs -text |
|
|
*.tar filter=lfs diff=lfs merge=lfs -text |
|
|
*.tflite filter=lfs diff=lfs merge=lfs -text |
|
|
*.tgz filter=lfs diff=lfs merge=lfs -text |
|
|
*.wasm filter=lfs diff=lfs merge=lfs -text |
|
|
*.xz filter=lfs diff=lfs merge=lfs -text |
|
|
*.zip filter=lfs diff=lfs merge=lfs -text |
|
|
*.zst filter=lfs diff=lfs merge=lfs -text |
|
|
*tfevents* filter=lfs diff=lfs merge=lfs -text |
|
|
|
|
|
*.pcm filter=lfs diff=lfs merge=lfs -text |
|
|
*.sam filter=lfs diff=lfs merge=lfs -text |
|
|
*.raw filter=lfs diff=lfs merge=lfs -text |
|
|
|
|
|
*.aac filter=lfs diff=lfs merge=lfs -text |
|
|
*.flac filter=lfs diff=lfs merge=lfs -text |
|
|
*.mp3 filter=lfs diff=lfs merge=lfs -text |
|
|
*.ogg filter=lfs diff=lfs merge=lfs -text |
|
|
*.wav filter=lfs diff=lfs merge=lfs -text |
|
|
|
|
|
*.bmp filter=lfs diff=lfs merge=lfs -text |
|
|
*.gif filter=lfs diff=lfs merge=lfs -text |
|
|
*.png filter=lfs diff=lfs merge=lfs -text |
|
|
*.tiff filter=lfs diff=lfs merge=lfs -text |
|
|
|
|
|
*.jpg filter=lfs diff=lfs merge=lfs -text |
|
|
*.jpeg filter=lfs diff=lfs merge=lfs -text |
|
|
*.webp filter=lfs diff=lfs merge=lfs -text |
|
|
|
|
|
*.mp4 filter=lfs diff=lfs merge=lfs -text |
|
|
*.webm filter=lfs diff=lfs merge=lfs -text |
|
|
Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information[[:space:]](CUI)_[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171,[[:space:]]Revision[[:space:]]3.[[:space:]]Small[[:space:]]Business[[:space:]]Primer.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Federal[[:space:]]Cybersecurity[[:space:]]Role-Based[[:space:]]Training[[:space:]]Approaches,[[:space:]]Successes,[[:space:]]and[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Best[[:space:]]Practices[[:space:]]for[[:space:]]Privileged[[:space:]]User[[:space:]]PIV[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guidelines[[:space:]]for[[:space:]]the[[:space:]]Creation[[:space:]]of[[:space:]]Interoperable[[:space:]]Software[[:space:]]Identification[[:space:]](SWID)[[:space:]]Tags.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Codes[[:space:]]for[[:space:]]Identification[[:space:]]of[[:space:]]Federal[[:space:]]and[[:space:]]Federally-Assisted[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
User's[[:space:]]Guide[[:space:]]to[[:space:]]Telework[[:space:]]and[[:space:]]Bring[[:space:]]Your[[:space:]]Own[[:space:]]Device[[:space:]](BYOD)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials[[:space:]](DPC)[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Research.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Establishing[[:space:]]Wireless[[:space:]]Robust[[:space:]]Security[[:space:]]Networks_[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]IEEE[[:space:]]802.11i.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]1[[:space:]]–[[:space:]]PIV[[:space:]]Card[[:space:]]Application[[:space:]]Namespace,[[:space:]]Data[[:space:]]Model[[:space:]]and[[:space:]]Representation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Specification[[:space:]]for[[:space:]]Asset[[:space:]]Reporting[[:space:]]Format[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Security[[:space:]]Segmentation[[:space:]]in[[:space:]]a[[:space:]]Small[[:space:]]Manufacturing[[:space:]]Environment.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Test[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Mobile[[:space:]]Device[[:space:]]Security_[[:space:]]Cloud[[:space:]]and[[:space:]]Hybrid[[:space:]]Builds.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guidelines[[:space:]]on[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
2nd[[:space:]]Annual[[:space:]]PKI[[:space:]]Research[[:space:]]Workshop[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Digital[[:space:]]Identity[[:space:]]Guidelines_[[:space:]]Authentication[[:space:]]and[[:space:]]Authenticator[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
A[[:space:]]Data[[:space:]]Structure[[:space:]]for[[:space:]]Integrity[[:space:]]Protection[[:space:]]with[[:space:]]Erasure[[:space:]]Capability.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Technical[[:space:]]Guide[[:space:]]to[[:space:]]Information[[:space:]]Security[[:space:]]Testing[[:space:]]and[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)[[:space:]]Security[[:space:]]Policy[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759[[:space:]]and[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Anne.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Using[[:space:]]the[[:space:]]CSF[[:space:]]Tiers.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Security[[:space:]]Property[[:space:]]Verification[[:space:]]by[[:space:]]Transition[[:space:]]Model.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Data[[:space:]]Integrity_[[:space:]]Recovering[[:space:]]from[[:space:]]Ransomware[[:space:]]and[[:space:]]Other[[:space:]]Destructive[[:space:]]Events.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Information[[:space:]]Security[[:space:]]Handbook_[[:space:]]A[[:space:]]Guide[[:space:]]for[[:space:]]Managers.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Maintenance[[:space:]]Testing[[:space:]]for[[:space:]]the[[:space:]]Data[[:space:]]Encryption[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Automation[[:space:]]Support[[:space:]]for[[:space:]]Control[[:space:]]Assessments_[[:space:]]Project[[:space:]]Update[[:space:]]and[[:space:]]Vision.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Transitioning[[:space:]]to[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]2.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Automation[[:space:]]Support[[:space:]]for[[:space:]]Security[[:space:]]Control[[:space:]]Assessments_[[:space:]]Volume[[:space:]]1_[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
An[[:space:]]Introduction[[:space:]]to[[:space:]]Information[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Foundational[[:space:]]Cybersecurity[[:space:]]Activities[[:space:]]for[[:space:]]IoT[[:space:]]Device[[:space:]]Manufacturers.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Third[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Introduction[[:space:]]to[[:space:]]Cybersecurity[[:space:]]for[[:space:]]Commercial[[:space:]]Satellite[[:space:]]Operations.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Proceedings[[:space:]]of[[:space:]]the[[:space:]]Cybersecurity[[:space:]]in[[:space:]]Cyber-Physical[[:space:]]Systems[[:space:]]Workshop,[[:space:]]April[[:space:]]23-24,[[:space:]]2012.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Summary[[:space:]]Report[[:space:]]for[[:space:]]“Workshop[[:space:]]on[[:space:]]Updating[[:space:]]Manufacturer[[:space:]]Guidance[[:space:]]for[[:space:]]Securable[[:space:]]Connected[[:space:]]Product[[:space:]]Development”.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Derived[[:space:]]PIV[[:space:]]Application[[:space:]]and[[:space:]]Data[[:space:]]Model[[:space:]]Test[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
ISCMA_[[:space:]]An[[:space:]]Information[[:space:]]Security[[:space:]]Continuous[[:space:]]Monitoring[[:space:]]Program[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
The[[:space:]]Common[[:space:]]Misuse[[:space:]]Scoring[[:space:]]System[[:space:]](CMSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Feature[[:space:]]Misuse[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Three[[:space:]]Variants[[:space:]]of[[:space:]]Ciphertext[[:space:]]Stealing[[:space:]]for[[:space:]]CBC[[:space:]]Mode.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Control[[:space:]]Baselines[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Report[[:space:]]on[[:space:]]the[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation[[:space:]]in[[:space:]]the[[:space:]]NIST[[:space:]]SP[[:space:]]800-38[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Bluetooth[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
The[[:space:]]Common[[:space:]]Configuration[[:space:]]Scoring[[:space:]]System[[:space:]](CCSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Security[[:space:]]Configuration[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Secure[[:space:]]Hash[[:space:]]Standard[[:space:]](SHS).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Assessing[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Computer[[:space:]]Security[[:space:]]Division[[:space:]]2012[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Ordered[[:space:]]t-way[[:space:]]Combinations[[:space:]]for[[:space:]]Testing[[:space:]]State-based[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
COTS[[:space:]]Security[[:space:]]Protection[[:space:]]Profile[[:space:]]-[[:space:]]Operating[[:space:]]Systems[[:space:]](CSPP-OS)[[:space:]](Worked[[:space:]]Example[[:space:]]Applying[[:space:]]Guidance[[:space:]]of[[:space:]]NISTIR-6462,[[:space:]]CSPP)[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cybersecurity[[:space:]]Framework[[:space:]]Profile[[:space:]]for[[:space:]]Electric[[:space:]]Vehicle[[:space:]]Extreme[[:space:]]Fast[[:space:]]Charging[[:space:]]Infrastructure.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
5th[[:space:]]Annual[[:space:]]PKI[[:space:]]R&D[[:space:]]Workshop[[:space:]]_Making[[:space:]]PKI[[:space:]]Easy[[:space:]]to[[:space:]]Use_[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Data[[:space:]]Confidentiality_[[:space:]]Identifying[[:space:]]and[[:space:]]Protecting[[:space:]]Assets[[:space:]]Against[[:space:]]Data[[:space:]]Breaches.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Building[[:space:]]a[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Learning[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Foundational[[:space:]]PNT[[:space:]]Profile_[[:space:]]Applying[[:space:]]the[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]for[[:space:]]the[[:space:]]Responsible[[:space:]]Use[[:space:]]of[[:space:]]Positioning,[[:space:]]Navigation,[[:space:]]and[[:space:]]Timing[[:space:]](PNT)[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
A[[:space:]]Review[[:space:]]of[[:space:]]U.S.[[:space:]]and[[:space:]]European[[:space:]]Security[[:space:]]Evaluation[[:space:]]Criteria.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Methodology[[:space:]]for[[:space:]]Characterizing[[:space:]]Network[[:space:]]Behavior[[:space:]]of[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]]Devices.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
IoT[[:space:]]Device[[:space:]]Cybersecurity[[:space:]]Guidance[[:space:]]for[[:space:]]the[[:space:]]Federal[[:space:]]Government_[[:space:]]Establishing[[:space:]]IoT[[:space:]]Device[[:space:]]Cybersecurity[[:space:]]Requirements.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
National[[:space:]]Online[[:space:]]Informative[[:space:]]References[[:space:]](OLIR)[[:space:]]Program_[[:space:]]Overview,[[:space:]]Benefits,[[:space:]]and[[:space:]]Use.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Data[[:space:]]Confidentiality_[[:space:]]Detect,[[:space:]]Respond[[:space:]]to,[[:space:]]and[[:space:]]Recover[[:space:]]from[[:space:]]Data[[:space:]]Breaches.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]of[[:space:]]Federal[[:space:]]Employees[[:space:]]and[[:space:]]Contractors.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)-Approved[[:space:]]Sensitive[[:space:]]Security[[:space:]]Parameter[[:space:]]Generation[[:space:]]and[[:space:]]Establishment[[:space:]]Methods_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]U.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
2020[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
PBX[[:space:]]Administrator’s[[:space:]]Security[[:space:]]Standards.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommended[[:space:]]Criteria[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Labeling[[:space:]]for[[:space:]]Consumer[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]](IoT)[[:space:]]Products.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Notional[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management[[:space:]]Practices[[:space:]]for[[:space:]]Federal[[:space:]]Information[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Computer[[:space:]]Security_[[:space:]]Selected[[:space:]]Articles.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Pair-Wise[[:space:]]Key-Establishment[[:space:]]Using[[:space:]]Integer[[:space:]]Factorization[[:space:]]Cryptography.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cybersecurity[[:space:]]Framework[[:space:]]Manufacturing[[:space:]]Profile[[:space:]]Low[[:space:]]Impact[[:space:]]Level[[:space:]]Example[[:space:]]Implementations[[:space:]]Guide_[[:space:]]Volume[[:space:]]2[[:space:]]–[[:space:]]Process-based[[:space:]]Manufacturing[[:space:]]System[[:space:]]Use[[:space:]]Case.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Stateless[[:space:]]Hash-Based[[:space:]]Digital[[:space:]]Signature[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Benefits[[:space:]]of[[:space:]]an[[:space:]]Updated[[:space:]]Mapping[[:space:]]between[[:space:]]the[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]and[[:space:]]the[[:space:]]NERC[[:space:]]Critical[[:space:]]Infrastructure[[:space:]]Protection[[:space:]]Standards.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
A[[:space:]]Survey[[:space:]]of[[:space:]]Remote[[:space:]]Monitoring.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Secure[[:space:]]Virtual[[:space:]]Network[[:space:]]Configuration[[:space:]]for[[:space:]]Virtual[[:space:]]Machine[[:space:]](VM)[[:space:]]Protection.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Workforce[[:space:]]Framework[[:space:]]for[[:space:]]Cybersecurity[[:space:]](NICE[[:space:]]Framework).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Galois_Counter[[:space:]]Mode[[:space:]](GCM)[[:space:]]and[[:space:]]GMAC.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
CMVP[[:space:]]Documentation[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Requirements[[:space:]]for[[:space:]]Cryptographic[[:space:]]Accordions.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]the[[:space:]]CMAC[[:space:]]Mode[[:space:]]for[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Workshop[[:space:]]on[[:space:]]the[[:space:]]Requirements[[:space:]]for[[:space:]]an[[:space:]]Accordion[[:space:]]Cipher[[:space:]]Mode[[:space:]]2024_[[:space:]]Workshop[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Blockchain[[:space:]]Networks_[[:space:]]Token[[:space:]]Design[[:space:]]and[[:space:]]Management[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Security[[:space:]]Guidelines[[:space:]]for[[:space:]]Storage[[:space:]]Infrastructure.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Symmetric[[:space:]]Key[[:space:]]Injection[[:space:]]onto[[:space:]]Smart[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Enhanced[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information_[[:space:]]A[[:space:]]Supplement[[:space:]]to[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
CMVP[[:space:]]Approved[[:space:]]Authentication[[:space:]]Mechanisms_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Requirements[[:space:]]for[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Annex[[:space:]]E[[:space:]]and[[:space:]]ISO_IEC[[:space:]]24579[[:space:]]Section[[:space:]]6.17.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Forensics[[:space:]]Web[[:space:]]Services[[:space:]](FWS).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Roadmap[[:space:]]Toward[[:space:]]Criteria[[:space:]]for[[:space:]]Threshold[[:space:]]Schemes[[:space:]]for[[:space:]]Cryptographic[[:space:]]Primitives.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Conformance[[:space:]]Test[[:space:]]Architecture[[:space:]]and[[:space:]]Test[[:space:]]Suite[[:space:]]for[[:space:]]ANSI_NIST-ITL[[:space:]]1-2007.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
A[[:space:]]Methodology[[:space:]]for[[:space:]]Developing[[:space:]]Authentication[[:space:]]Assurance[[:space:]]Level[[:space:]]Taxonomy[[:space:]]for[[:space:]]Smart[[:space:]]Card-based[[:space:]]Identity[[:space:]]Verification.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]Applications[[:space:]]Using[[:space:]]Approved[[:space:]]Hash[[:space:]]Algorithms.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Bug[[:space:]]Framework[[:space:]](BF)_[[:space:]]Formalizing[[:space:]]Cybersecurity[[:space:]]Weaknesses[[:space:]]and[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Storage[[:space:]]Encryption[[:space:]]Technologies[[:space:]]for[[:space:]]End[[:space:]]User[[:space:]]Devices.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Manufacturing[[:space:]]Profile[[:space:]]Implementation[[:space:]]Methodology[[:space:]]for[[:space:]]a[[:space:]]Robotic[[:space:]]Workcell.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]LTE[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Case[[:space:]]Studies[[:space:]]in[[:space:]]Cyber[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management_[[:space:]]Anonymous[[:space:]]Renewable[[:space:]]Energy[[:space:]]Company.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Trusted[[:space:]]Cloud_[[:space:]]Security[[:space:]]Practice[[:space:]]Guide[[:space:]]for[[:space:]]VMware[[:space:]]Hybrid[[:space:]]Cloud[[:space:]]Infrastructure[[:space:]]as[[:space:]]a[[:space:]]Service[[:space:]](IaaS)[[:space:]]Environments.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Fingerprint[[:space:]]Identification[[:space:]]and[[:space:]]Mobile[[:space:]]Handheld[[:space:]]Devices_[[:space:]]An[[:space:]]Overview[[:space:]]and[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
BIOS[[:space:]]Protection[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Measuring[[:space:]]the[[:space:]]Common[[:space:]]Vulnerability[[:space:]]Scoring[[:space:]]System[[:space:]]Base[[:space:]]Score[[:space:]]Equation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guidelines[[:space:]]for[[:space:]]API[[:space:]]Protection[[:space:]]for[[:space:]]Cloud-Native[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Measuring[[:space:]]the[[:space:]]Usability[[:space:]]and[[:space:]]Security[[:space:]]of[[:space:]]Permuted[[:space:]]Passwords[[:space:]]on[[:space:]]Mobile[[:space:]]Platforms.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Integrating[[:space:]]Forensic[[:space:]]Techniques[[:space:]]into[[:space:]]Incident[[:space:]]Response.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Interagency[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Status[[:space:]]of[[:space:]]International[[:space:]]Cybersecurity[[:space:]]Standardization[[:space:]]for[[:space:]]the[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]](IoT).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Case[[:space:]]Studies[[:space:]]in[[:space:]]Cyber[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management_[[:space:]]Seagate[[:space:]]Technology.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Test,[[:space:]]Training,[[:space:]]and[[:space:]]Exercise[[:space:]]Programs[[:space:]]for[[:space:]]IT[[:space:]]Plans[[:space:]]and[[:space:]]Capabilities.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guide[[:space:]]to[[:space:]]Computer[[:space:]]Security[[:space:]]Log[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Module-Lattice-Based[[:space:]]Key-Encapsulation[[:space:]]Mechanism[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Cloud[[:space:]]Computing[[:space:]]Forensic[[:space:]]Science[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Issues[[:space:]]&[[:space:]]Challenges[[:space:]]in[[:space:]]Cloud[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
BioCTS[[:space:]]2012_[[:space:]]Advanced[[:space:]]Conformance[[:space:]]Test[[:space:]]Architectures[[:space:]]and[[:space:]]Test[[:space:]]Suites[[:space:]]for[[:space:]]Biometric[[:space:]]Data[[:space:]]Interchange[[:space:]]Formats[[:space:]]and[[:space:]]Biometric[[:space:]]Information[[:space:]]Records.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
2016[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Strategies[[:space:]]for[[:space:]]the[[:space:]]Integration[[:space:]]of[[:space:]]Software[[:space:]]Supply[[:space:]]Chain[[:space:]]Security[[:space:]]in[[:space:]]DevSecOps[[:space:]]CI_CD[[:space:]]Pipelines.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Securing[[:space:]]Telehealth[[:space:]]Remote[[:space:]]Patient[[:space:]]Monitoring[[:space:]]Ecosystem.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Performance[[:space:]]Assurance[[:space:]]and[[:space:]]Data[[:space:]]Integrity[[:space:]]Practices.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Audit[[:space:]]and[[:space:]]Evaluation[[:space:]]of[[:space:]]Computer[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Taxonomic[[:space:]]Rules[[:space:]]for[[:space:]]Password[[:space:]]Policies_[[:space:]]Translating[[:space:]]the[[:space:]]Informal[[:space:]]to[[:space:]]the[[:space:]]Formal[[:space:]]Language.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Message[[:space:]]Authentication[[:space:]]Code[[:space:]](MAC)[[:space:]]Validation[[:space:]]System_[[:space:]]Requirements[[:space:]]and[[:space:]]Procedures.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST[[:space:]]Privacy[[:space:]]Framework_[[:space:]]A[[:space:]]Tool[[:space:]]for[[:space:]]Improving[[:space:]]Privacy[[:space:]]Through[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management,[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Computer[[:space:]]Security[[:space:]]Division[[:space:]]2013[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Addressing[[:space:]]Visibility[[:space:]]Challenges[[:space:]]with[[:space:]]TLS[[:space:]]1.3[[:space:]]within[[:space:]]the[[:space:]]Enterprise_[[:space:]]High-Level[[:space:]]Document.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Assessing[[:space:]]Federal[[:space:]]and[[:space:]]Commercial[[:space:]]Information[[:space:]]Security[[:space:]]Needs.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Assessing[[:space:]]Security[[:space:]]and[[:space:]]Privacy[[:space:]]Controls[[:space:]]in[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Cybersecurity[[:space:]]Framework[[:space:]]Profile[[:space:]]for[[:space:]]Liquefied[[:space:]]Natural[[:space:]]Gas.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Recommendation[[:space:]]for[[:space:]]the[[:space:]]Entropy[[:space:]]Sources[[:space:]]Used[[:space:]]for[[:space:]]Random[[:space:]]Bit[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Report[[:space:]]of[[:space:]]the[[:space:]]Workshop[[:space:]]on[[:space:]]Cryptography[[:space:]]in[[:space:]]Support[[:space:]]of[[:space:]]Computer[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guidelines[[:space:]]for[[:space:]]the[[:space:]]Authorization[[:space:]]of[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]]Card[[:space:]]Issuers[[:space:]](PCI)[[:space:]]and[[:space:]]Derived[[:space:]]PIV[[:space:]]Credential[[:space:]]Issuers[[:space:]](DPCI).pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Conformance[[:space:]]Test[[:space:]]Architecture[[:space:]]for[[:space:]]Biometric[[:space:]]Data[[:space:]]Interchange[[:space:]]Formats[[:space:]]-[[:space:]]Version[[:space:]]Beta[[:space:]]2.0.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Fourth[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
NIST_SP_800-53r5_Security_Privacy_Controls.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Guidelines[[:space:]]for[[:space:]]Media[[:space:]]Sanitization.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
Getting[[:space:]]Started[[:space:]]with[[:space:]]the[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]Framework_[[:space:]]A[[:space:]]Quick[[:space:]]Start[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
BIOS[[:space:]]Protection[[:space:]]Guidelines[[:space:]]for[[:space:]]Servers.pdf filter=lfs diff=lfs merge=lfs -text |
|
|
|