*.7z filter=lfs diff=lfs merge=lfs -text *.arrow filter=lfs diff=lfs merge=lfs -text *.bin filter=lfs diff=lfs merge=lfs -text *.bz2 filter=lfs diff=lfs merge=lfs -text *.ckpt filter=lfs diff=lfs merge=lfs -text *.ftz filter=lfs diff=lfs merge=lfs -text *.gz filter=lfs diff=lfs merge=lfs -text *.h5 filter=lfs diff=lfs merge=lfs -text *.joblib filter=lfs diff=lfs merge=lfs -text *.lfs.* filter=lfs diff=lfs merge=lfs -text *.lz4 filter=lfs diff=lfs merge=lfs -text *.mds filter=lfs diff=lfs merge=lfs -text *.mlmodel filter=lfs diff=lfs merge=lfs -text *.model filter=lfs diff=lfs merge=lfs -text *.msgpack filter=lfs diff=lfs merge=lfs -text *.npy filter=lfs diff=lfs merge=lfs -text *.npz filter=lfs diff=lfs merge=lfs -text *.onnx filter=lfs diff=lfs merge=lfs -text *.ot filter=lfs diff=lfs merge=lfs -text *.parquet filter=lfs diff=lfs merge=lfs -text *.pb filter=lfs diff=lfs merge=lfs -text *.pickle filter=lfs diff=lfs merge=lfs -text *.pkl filter=lfs diff=lfs merge=lfs -text *.pt filter=lfs diff=lfs merge=lfs -text *.pth filter=lfs diff=lfs merge=lfs -text *.rar filter=lfs diff=lfs merge=lfs -text *.safetensors filter=lfs diff=lfs merge=lfs -text saved_model/**/* filter=lfs diff=lfs merge=lfs -text *.tar.* filter=lfs diff=lfs merge=lfs -text *.tar filter=lfs diff=lfs merge=lfs -text *.tflite filter=lfs diff=lfs merge=lfs -text *.tgz filter=lfs diff=lfs merge=lfs -text *.wasm filter=lfs diff=lfs merge=lfs -text *.xz filter=lfs diff=lfs merge=lfs -text *.zip filter=lfs diff=lfs merge=lfs -text *.zst filter=lfs diff=lfs merge=lfs -text *tfevents* filter=lfs diff=lfs merge=lfs -text # Audio files - uncompressed *.pcm filter=lfs diff=lfs merge=lfs -text *.sam filter=lfs diff=lfs merge=lfs -text *.raw filter=lfs diff=lfs merge=lfs -text # Audio files - compressed *.aac filter=lfs diff=lfs merge=lfs -text *.flac filter=lfs diff=lfs merge=lfs -text *.mp3 filter=lfs diff=lfs merge=lfs -text *.ogg filter=lfs diff=lfs merge=lfs -text *.wav filter=lfs diff=lfs merge=lfs -text # Image files - uncompressed *.bmp filter=lfs diff=lfs merge=lfs -text *.gif filter=lfs diff=lfs merge=lfs -text *.png filter=lfs diff=lfs merge=lfs -text *.tiff filter=lfs diff=lfs merge=lfs -text # Image files - compressed *.jpg filter=lfs diff=lfs merge=lfs -text *.jpeg filter=lfs diff=lfs merge=lfs -text *.webp filter=lfs diff=lfs merge=lfs -text # Video files - compressed *.mp4 filter=lfs diff=lfs merge=lfs -text *.webm filter=lfs diff=lfs merge=lfs -text Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information[[:space:]](CUI)_[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171,[[:space:]]Revision[[:space:]]3.[[:space:]]Small[[:space:]]Business[[:space:]]Primer.pdf filter=lfs diff=lfs merge=lfs -text Federal[[:space:]]Cybersecurity[[:space:]]Role-Based[[:space:]]Training[[:space:]]Approaches,[[:space:]]Successes,[[:space:]]and[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text Best[[:space:]]Practices[[:space:]]for[[:space:]]Privileged[[:space:]]User[[:space:]]PIV[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]the[[:space:]]Creation[[:space:]]of[[:space:]]Interoperable[[:space:]]Software[[:space:]]Identification[[:space:]](SWID)[[:space:]]Tags.pdf filter=lfs diff=lfs merge=lfs -text Codes[[:space:]]for[[:space:]]Identification[[:space:]]of[[:space:]]Federal[[:space:]]and[[:space:]]Federally-Assisted[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text User's[[:space:]]Guide[[:space:]]to[[:space:]]Telework[[:space:]]and[[:space:]]Bring[[:space:]]Your[[:space:]]Own[[:space:]]Device[[:space:]](BYOD)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials[[:space:]](DPC)[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Research.pdf filter=lfs diff=lfs merge=lfs -text Establishing[[:space:]]Wireless[[:space:]]Robust[[:space:]]Security[[:space:]]Networks_[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]IEEE[[:space:]]802.11i.pdf filter=lfs diff=lfs merge=lfs -text Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]1[[:space:]]–[[:space:]]PIV[[:space:]]Card[[:space:]]Application[[:space:]]Namespace,[[:space:]]Data[[:space:]]Model[[:space:]]and[[:space:]]Representation.pdf filter=lfs diff=lfs merge=lfs -text Specification[[:space:]]for[[:space:]]Asset[[:space:]]Reporting[[:space:]]Format[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Segmentation[[:space:]]in[[:space:]]a[[:space:]]Small[[:space:]]Manufacturing[[:space:]]Environment.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Test[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text Mobile[[:space:]]Device[[:space:]]Security_[[:space:]]Cloud[[:space:]]and[[:space:]]Hybrid[[:space:]]Builds.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]on[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text 2nd[[:space:]]Annual[[:space:]]PKI[[:space:]]Research[[:space:]]Workshop[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text Digital[[:space:]]Identity[[:space:]]Guidelines_[[:space:]]Authentication[[:space:]]and[[:space:]]Authenticator[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Data[[:space:]]Structure[[:space:]]for[[:space:]]Integrity[[:space:]]Protection[[:space:]]with[[:space:]]Erasure[[:space:]]Capability.pdf filter=lfs diff=lfs merge=lfs -text Technical[[:space:]]Guide[[:space:]]to[[:space:]]Information[[:space:]]Security[[:space:]]Testing[[:space:]]and[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)[[:space:]]Security[[:space:]]Policy[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759[[:space:]]and[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Anne.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Using[[:space:]]the[[:space:]]CSF[[:space:]]Tiers.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Property[[:space:]]Verification[[:space:]]by[[:space:]]Transition[[:space:]]Model.pdf filter=lfs diff=lfs merge=lfs -text Data[[:space:]]Integrity_[[:space:]]Recovering[[:space:]]from[[:space:]]Ransomware[[:space:]]and[[:space:]]Other[[:space:]]Destructive[[:space:]]Events.pdf filter=lfs diff=lfs merge=lfs -text Information[[:space:]]Security[[:space:]]Handbook_[[:space:]]A[[:space:]]Guide[[:space:]]for[[:space:]]Managers.pdf filter=lfs diff=lfs merge=lfs -text Maintenance[[:space:]]Testing[[:space:]]for[[:space:]]the[[:space:]]Data[[:space:]]Encryption[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text Automation[[:space:]]Support[[:space:]]for[[:space:]]Control[[:space:]]Assessments_[[:space:]]Project[[:space:]]Update[[:space:]]and[[:space:]]Vision.pdf filter=lfs diff=lfs merge=lfs -text Transitioning[[:space:]]to[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]2.pdf filter=lfs diff=lfs merge=lfs -text Automation[[:space:]]Support[[:space:]]for[[:space:]]Security[[:space:]]Control[[:space:]]Assessments_[[:space:]]Volume[[:space:]]1_[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text An[[:space:]]Introduction[[:space:]]to[[:space:]]Information[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Foundational[[:space:]]Cybersecurity[[:space:]]Activities[[:space:]]for[[:space:]]IoT[[:space:]]Device[[:space:]]Manufacturers.pdf filter=lfs diff=lfs merge=lfs -text Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Third[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text Introduction[[:space:]]to[[:space:]]Cybersecurity[[:space:]]for[[:space:]]Commercial[[:space:]]Satellite[[:space:]]Operations.pdf filter=lfs diff=lfs merge=lfs -text Proceedings[[:space:]]of[[:space:]]the[[:space:]]Cybersecurity[[:space:]]in[[:space:]]Cyber-Physical[[:space:]]Systems[[:space:]]Workshop,[[:space:]]April[[:space:]]23-24,[[:space:]]2012.pdf filter=lfs diff=lfs merge=lfs -text Summary[[:space:]]Report[[:space:]]for[[:space:]]“Workshop[[:space:]]on[[:space:]]Updating[[:space:]]Manufacturer[[:space:]]Guidance[[:space:]]for[[:space:]]Securable[[:space:]]Connected[[:space:]]Product[[:space:]]Development”.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]PIV[[:space:]]Application[[:space:]]and[[:space:]]Data[[:space:]]Model[[:space:]]Test[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text ISCMA_[[:space:]]An[[:space:]]Information[[:space:]]Security[[:space:]]Continuous[[:space:]]Monitoring[[:space:]]Program[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Common[[:space:]]Misuse[[:space:]]Scoring[[:space:]]System[[:space:]](CMSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Feature[[:space:]]Misuse[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Three[[:space:]]Variants[[:space:]]of[[:space:]]Ciphertext[[:space:]]Stealing[[:space:]]for[[:space:]]CBC[[:space:]]Mode.pdf filter=lfs diff=lfs merge=lfs -text Control[[:space:]]Baselines[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]on[[:space:]]the[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation[[:space:]]in[[:space:]]the[[:space:]]NIST[[:space:]]SP[[:space:]]800-38[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Bluetooth[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Common[[:space:]]Configuration[[:space:]]Scoring[[:space:]]System[[:space:]](CCSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Security[[:space:]]Configuration[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text Secure[[:space:]]Hash[[:space:]]Standard[[:space:]](SHS).pdf filter=lfs diff=lfs merge=lfs -text Assessing[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2012[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Ordered[[:space:]]t-way[[:space:]]Combinations[[:space:]]for[[:space:]]Testing[[:space:]]State-based[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text COTS[[:space:]]Security[[:space:]]Protection[[:space:]]Profile[[:space:]]-[[:space:]]Operating[[:space:]]Systems[[:space:]](CSPP-OS)[[:space:]](Worked[[:space:]]Example[[:space:]]Applying[[:space:]]Guidance[[:space:]]of[[:space:]]NISTIR-6462,[[:space:]]CSPP)[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text Cybersecurity[[:space:]]Framework[[:space:]]Profile[[:space:]]for[[:space:]]Electric[[:space:]]Vehicle[[:space:]]Extreme[[:space:]]Fast[[:space:]]Charging[[:space:]]Infrastructure.pdf filter=lfs diff=lfs merge=lfs -text 5th[[:space:]]Annual[[:space:]]PKI[[:space:]]R&D[[:space:]]Workshop[[:space:]]_Making[[:space:]]PKI[[:space:]]Easy[[:space:]]to[[:space:]]Use_[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text Data[[:space:]]Confidentiality_[[:space:]]Identifying[[:space:]]and[[:space:]]Protecting[[:space:]]Assets[[:space:]]Against[[:space:]]Data[[:space:]]Breaches.pdf filter=lfs diff=lfs merge=lfs -text Building[[:space:]]a[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Learning[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text