Add IoT Device Cybersecurity Guidance for the Federal Government_ Establishing IoT Device Cybersecurity Requirements.pdf 1a6ce01 verified ethanolivertroy commited on Oct 22
Add Methodology for Characterizing Network Behavior of Internet of Things Devices.pdf d3bfd83 verified ethanolivertroy commited on Oct 22
Add Vulnerabilities in Quantum Key Distribution Protocols.pdf 2877cc6 verified ethanolivertroy commited on Oct 22
Add A Review of U.S. and European Security Evaluation Criteria.pdf 09de0cf verified ethanolivertroy commited on Oct 22
Add Foundational PNT Profile_ Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.pdf e943814 verified ethanolivertroy commited on Oct 22
Add Building a Cybersecurity and Privacy Learning Program.pdf 77e5266 verified ethanolivertroy commited on Oct 22
Add Data Confidentiality_ Identifying and Protecting Assets Against Data Breaches.pdf 680469d verified ethanolivertroy commited on Oct 22
Add 5th Annual PKI R&D Workshop _Making PKI Easy to Use_ Proceedings.pdf 0a320af verified ethanolivertroy commited on Oct 22
Add Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure.pdf b741587 verified ethanolivertroy commited on Oct 22
Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf 4ebb140 verified ethanolivertroy commited on Oct 22
Add Ordered t-way Combinations for Testing State-based Systems.pdf d26174f verified ethanolivertroy commited on Oct 22
Add Computer Security Division 2012 Annual Report.pdf 8a262c9 verified ethanolivertroy commited on Oct 22
Add Assessing Security Requirements for Controlled Unclassified Information.pdf ed10cb9 verified ethanolivertroy commited on Oct 22
Add The Common Configuration Scoring System (CCSS)_ Metrics for Software Security Configuration Vulnerabilities.pdf 1af960c verified ethanolivertroy commited on Oct 22
Add Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series.pdf 3eb7a35 verified ethanolivertroy commited on Oct 22
Add Control Baselines for Information Systems and Organizations.pdf d3dc346 verified ethanolivertroy commited on Oct 22
Add Recommendation for Block Cipher Modes of Operation_ Three Variants of Ciphertext Stealing for CBC Mode.pdf 27e9dbd verified ethanolivertroy commited on Oct 22
Add The Common Misuse Scoring System (CMSS)_ Metrics for Software Feature Misuse Vulnerabilities.pdf 60276e1 verified ethanolivertroy commited on Oct 22
Add ISCMA_ An Information Security Continuous Monitoring Program Assessment.pdf cc0d1d9 verified ethanolivertroy commited on Oct 22
Add Derived PIV Application and Data Model Test Guidelines.pdf 16ec868 verified ethanolivertroy commited on Oct 22
Add Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”.pdf 34a2393 verified ethanolivertroy commited on Oct 22
Add Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012.pdf f7ce9a3 verified ethanolivertroy commited on Oct 22
Add Introduction to Cybersecurity for Commercial Satellite Operations.pdf 39cd80d verified ethanolivertroy commited on Oct 22
Add Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process.pdf d9a117b verified ethanolivertroy commited on Oct 22
Add Foundational Cybersecurity Activities for IoT Device Manufacturers.pdf b926ea6 verified ethanolivertroy commited on Oct 22
Add Standards for Security Categorization of Federal Information and Information Systems.pdf f92a9af verified ethanolivertroy commited on Oct 22
Add Automation Support for Security Control Assessments_ Volume 1_ Overview.pdf ed05023 verified ethanolivertroy commited on Oct 22
Add Transitioning to the Security Content Automation Protocol (SCAP) Version 2.pdf b3d37c6 verified ethanolivertroy commited on Oct 22
Add Automation Support for Control Assessments_ Project Update and Vision.pdf bfbad7e verified ethanolivertroy commited on Oct 22
Add Maintenance Testing for the Data Encryption Standard.pdf 10e7e5c verified ethanolivertroy commited on Oct 22
Add Information Security Handbook_ A Guide for Managers.pdf 2cb3d06 verified ethanolivertroy commited on Oct 22
Add Data Integrity_ Recovering from Ransomware and Other Destructive Events.pdf 73bf0b0 verified ethanolivertroy commited on Oct 22
Add Security Property Verification by Transition Model.pdf 3fdf206 verified ethanolivertroy commited on Oct 22
Add NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Using the CSF Tiers.pdf 9569c23 verified ethanolivertroy commited on Oct 22
Add Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne.pdf 8428251 verified ethanolivertroy commited on Oct 22
Add Technical Guide to Information Security Testing and Assessment.pdf 84574c6 verified ethanolivertroy commited on Oct 22
Add A Data Structure for Integrity Protection with Erasure Capability.pdf fb65eb4 verified ethanolivertroy commited on Oct 22
Add Digital Identity Guidelines_ Authentication and Authenticator Management.pdf 078aef1 verified ethanolivertroy commited on Oct 22
Add 2nd Annual PKI Research Workshop Proceedings.pdf 34b4b1d verified ethanolivertroy commited on Oct 22
Add Mobile Device Security_ Cloud and Hybrid Builds.pdf f9c3fad verified ethanolivertroy commited on Oct 22
Add NIST Test Personal Identity Verification (PIV) Cards.pdf 246abfb verified ethanolivertroy commited on Oct 22
Add Security Segmentation in a Small Manufacturing Environment.pdf 5f72187 verified ethanolivertroy commited on Oct 22
Add Specification for Asset Reporting Format 1.1.pdf 0ee5493 verified ethanolivertroy commited on Oct 22
Add Interfaces for Personal Identity Verification_ Part 1 – PIV Card Application Namespace, Data Model and Representation.pdf e2cf21b verified ethanolivertroy commited on Oct 22
Add Establishing Wireless Robust Security Networks_ A Guide to IEEE 802.11i.pdf fa54100 verified ethanolivertroy commited on Oct 22
Add Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research.pdf 80b497d verified ethanolivertroy commited on Oct 22