Search Data.gov
Found 24 dataset(s) matching "protocol security".
-
Security automation reference data is currently housed within the National Vulnerability Database (NVD). The NVD is the U.S. Government repository of security automation data based on security...
-
The NIST BGP Secure Routing Extension (BGP-SRx) prototype is an open source reference implementation and research platform for investigating emerging BGP security extensions and supporting...
-
SCAP Composer is a software application for creating Security Content Automation Protocol (SCAP) source data stream collections from Extensible Markup Language (XML) documents valid with respect...
-
This library implements a secure device onboarding protocol for Named Data Networking using SPAKE2 and NDNCERT. It contains three components corresponding to the roles defined in the protocol:...
-
This study examines the state of counterterrorism and homeland security in five large urban law enforcement agencies (the Boston Police Department, the Houston Police Department, the Las Vegas...
-
The NIST BGP RPKI IO framework (BRIO) is a test tool only subset of the BGP-SRx Framework. It is an open source implementation and test platform that allows the synthetic generation of test data...
-
The Networking and Information Technology Research and Development (NITRD) Program`s Wireless Spectrum Research and Development (WSRD) Interagency Working Group (IWG), which is co-chaired by the...
-
Presented November 30, 2022, this webinar is part of the Child Welfare Information Technology Managers and Staff Series. The presentation focuses on threat prevention, new federal guidance on data...
-
The 2016 Baccalaureate and Beyond Longitudinal Study (B&B:16) is a study that is part of the Baccalaureate and Beyond Longitudinal Study (B&B) program; program data are available since 1989 at...
-
This is a short communication manuscript entitled, “Rapid Viability (RV) PCR Protocol for Detection of Francisella tularensis” to be published in a peer-reviewed journal. This pathogen survives...
-
This study was initiated by the administrator of a county jail in the Northern Plains of the United States who was concerned about the incidence of suicide behaviors in that...
-
These are scanned recordings from the Rangely earthquake control experiment that took place from 1969-1974 in the area surrounding Rangely, Colorado. Data were telemetered to Menlo Park,...
-
The USGS Southwest Repeat Photography Collection (‘Collection’), formerly named the Desert Laboratory Repeat Photography Collection, is now housed by the Southwest Biological Science Center (SBSC)...
-
Despite the critical information security issues faced by academic institutions, little research has been conducted at the policy, practice, or theoretical levels to address these issues, and few...
-
Random numbers are an important resource for applications such as numerical simulation and secure communication. However, it is difficult to certify whether a physical random number generator is...
-
User Equipment (UE)-to-Network Relay functionality was introduced in Release 13 of the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) to extend and improve user...
-
The Bonnet Carré Spillway (BCS), located about 28 miles northwest of New Orleans, Louisiana, was constructed in the early 1930s as part of an integrated flood-control system for the lower...
-
This data collection represents a process and outcome evaluation of the Office Technology Training program at the Rio Consumnes Correctional Center (RCCC) in Sacramento County. RCCC is a county...
-
The Office of the Legal Adviser publishes the annual Digest of United States Practice in International Law to provide the public with a historical record of the views and practice of the...
-
<p>Sweetpotato (<em>Ipomoea batatas</em>) plays a critical role in food security and is the most important root crop worldwide following potatoes and cassava. In the United States (US), it is...