*.7z filter=lfs diff=lfs merge=lfs -text *.arrow filter=lfs diff=lfs merge=lfs -text *.bin filter=lfs diff=lfs merge=lfs -text *.bz2 filter=lfs diff=lfs merge=lfs -text *.ckpt filter=lfs diff=lfs merge=lfs -text *.ftz filter=lfs diff=lfs merge=lfs -text *.gz filter=lfs diff=lfs merge=lfs -text *.h5 filter=lfs diff=lfs merge=lfs -text *.joblib filter=lfs diff=lfs merge=lfs -text *.lfs.* filter=lfs diff=lfs merge=lfs -text *.lz4 filter=lfs diff=lfs merge=lfs -text *.mds filter=lfs diff=lfs merge=lfs -text *.mlmodel filter=lfs diff=lfs merge=lfs -text *.model filter=lfs diff=lfs merge=lfs -text *.msgpack filter=lfs diff=lfs merge=lfs -text *.npy filter=lfs diff=lfs merge=lfs -text *.npz filter=lfs diff=lfs merge=lfs -text *.onnx filter=lfs diff=lfs merge=lfs -text *.ot filter=lfs diff=lfs merge=lfs -text *.parquet filter=lfs diff=lfs merge=lfs -text *.pb filter=lfs diff=lfs merge=lfs -text *.pickle filter=lfs diff=lfs merge=lfs -text *.pkl filter=lfs diff=lfs merge=lfs -text *.pt filter=lfs diff=lfs merge=lfs -text *.pth filter=lfs diff=lfs merge=lfs -text *.rar filter=lfs diff=lfs merge=lfs -text *.safetensors filter=lfs diff=lfs merge=lfs -text saved_model/**/* filter=lfs diff=lfs merge=lfs -text *.tar.* filter=lfs diff=lfs merge=lfs -text *.tar filter=lfs diff=lfs merge=lfs -text *.tflite filter=lfs diff=lfs merge=lfs -text *.tgz filter=lfs diff=lfs merge=lfs -text *.wasm filter=lfs diff=lfs merge=lfs -text *.xz filter=lfs diff=lfs merge=lfs -text *.zip filter=lfs diff=lfs merge=lfs -text *.zst filter=lfs diff=lfs merge=lfs -text *tfevents* filter=lfs diff=lfs merge=lfs -text # Audio files - uncompressed *.pcm filter=lfs diff=lfs merge=lfs -text *.sam filter=lfs diff=lfs merge=lfs -text *.raw filter=lfs diff=lfs merge=lfs -text # Audio files - compressed *.aac filter=lfs diff=lfs merge=lfs -text *.flac filter=lfs diff=lfs merge=lfs -text *.mp3 filter=lfs diff=lfs merge=lfs -text *.ogg filter=lfs diff=lfs merge=lfs -text *.wav filter=lfs diff=lfs merge=lfs -text # Image files - uncompressed *.bmp filter=lfs diff=lfs merge=lfs -text *.gif filter=lfs diff=lfs merge=lfs -text *.png filter=lfs diff=lfs merge=lfs -text *.tiff filter=lfs diff=lfs merge=lfs -text # Image files - compressed *.jpg filter=lfs diff=lfs merge=lfs -text *.jpeg filter=lfs diff=lfs merge=lfs -text *.webp filter=lfs diff=lfs merge=lfs -text # Video files - compressed *.mp4 filter=lfs diff=lfs merge=lfs -text *.webm filter=lfs diff=lfs merge=lfs -text Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information[[:space:]](CUI)_[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171,[[:space:]]Revision[[:space:]]3.[[:space:]]Small[[:space:]]Business[[:space:]]Primer.pdf filter=lfs diff=lfs merge=lfs -text Federal[[:space:]]Cybersecurity[[:space:]]Role-Based[[:space:]]Training[[:space:]]Approaches,[[:space:]]Successes,[[:space:]]and[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text Best[[:space:]]Practices[[:space:]]for[[:space:]]Privileged[[:space:]]User[[:space:]]PIV[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]the[[:space:]]Creation[[:space:]]of[[:space:]]Interoperable[[:space:]]Software[[:space:]]Identification[[:space:]](SWID)[[:space:]]Tags.pdf filter=lfs diff=lfs merge=lfs -text Codes[[:space:]]for[[:space:]]Identification[[:space:]]of[[:space:]]Federal[[:space:]]and[[:space:]]Federally-Assisted[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text User's[[:space:]]Guide[[:space:]]to[[:space:]]Telework[[:space:]]and[[:space:]]Bring[[:space:]]Your[[:space:]]Own[[:space:]]Device[[:space:]](BYOD)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials[[:space:]](DPC)[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Research.pdf filter=lfs diff=lfs merge=lfs -text Establishing[[:space:]]Wireless[[:space:]]Robust[[:space:]]Security[[:space:]]Networks_[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]IEEE[[:space:]]802.11i.pdf filter=lfs diff=lfs merge=lfs -text Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]1[[:space:]]–[[:space:]]PIV[[:space:]]Card[[:space:]]Application[[:space:]]Namespace,[[:space:]]Data[[:space:]]Model[[:space:]]and[[:space:]]Representation.pdf filter=lfs diff=lfs merge=lfs -text Specification[[:space:]]for[[:space:]]Asset[[:space:]]Reporting[[:space:]]Format[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Segmentation[[:space:]]in[[:space:]]a[[:space:]]Small[[:space:]]Manufacturing[[:space:]]Environment.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Test[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text Mobile[[:space:]]Device[[:space:]]Security_[[:space:]]Cloud[[:space:]]and[[:space:]]Hybrid[[:space:]]Builds.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]on[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text 2nd[[:space:]]Annual[[:space:]]PKI[[:space:]]Research[[:space:]]Workshop[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text Digital[[:space:]]Identity[[:space:]]Guidelines_[[:space:]]Authentication[[:space:]]and[[:space:]]Authenticator[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Data[[:space:]]Structure[[:space:]]for[[:space:]]Integrity[[:space:]]Protection[[:space:]]with[[:space:]]Erasure[[:space:]]Capability.pdf filter=lfs diff=lfs merge=lfs -text Technical[[:space:]]Guide[[:space:]]to[[:space:]]Information[[:space:]]Security[[:space:]]Testing[[:space:]]and[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)[[:space:]]Security[[:space:]]Policy[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759[[:space:]]and[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Anne.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Using[[:space:]]the[[:space:]]CSF[[:space:]]Tiers.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Property[[:space:]]Verification[[:space:]]by[[:space:]]Transition[[:space:]]Model.pdf filter=lfs diff=lfs merge=lfs -text Data[[:space:]]Integrity_[[:space:]]Recovering[[:space:]]from[[:space:]]Ransomware[[:space:]]and[[:space:]]Other[[:space:]]Destructive[[:space:]]Events.pdf filter=lfs diff=lfs merge=lfs -text Information[[:space:]]Security[[:space:]]Handbook_[[:space:]]A[[:space:]]Guide[[:space:]]for[[:space:]]Managers.pdf filter=lfs diff=lfs merge=lfs -text Maintenance[[:space:]]Testing[[:space:]]for[[:space:]]the[[:space:]]Data[[:space:]]Encryption[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text Automation[[:space:]]Support[[:space:]]for[[:space:]]Control[[:space:]]Assessments_[[:space:]]Project[[:space:]]Update[[:space:]]and[[:space:]]Vision.pdf filter=lfs diff=lfs merge=lfs -text Transitioning[[:space:]]to[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]2.pdf filter=lfs diff=lfs merge=lfs -text Automation[[:space:]]Support[[:space:]]for[[:space:]]Security[[:space:]]Control[[:space:]]Assessments_[[:space:]]Volume[[:space:]]1_[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text An[[:space:]]Introduction[[:space:]]to[[:space:]]Information[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Foundational[[:space:]]Cybersecurity[[:space:]]Activities[[:space:]]for[[:space:]]IoT[[:space:]]Device[[:space:]]Manufacturers.pdf filter=lfs diff=lfs merge=lfs -text Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Third[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text Introduction[[:space:]]to[[:space:]]Cybersecurity[[:space:]]for[[:space:]]Commercial[[:space:]]Satellite[[:space:]]Operations.pdf filter=lfs diff=lfs merge=lfs -text Proceedings[[:space:]]of[[:space:]]the[[:space:]]Cybersecurity[[:space:]]in[[:space:]]Cyber-Physical[[:space:]]Systems[[:space:]]Workshop,[[:space:]]April[[:space:]]23-24,[[:space:]]2012.pdf filter=lfs diff=lfs merge=lfs -text Summary[[:space:]]Report[[:space:]]for[[:space:]]“Workshop[[:space:]]on[[:space:]]Updating[[:space:]]Manufacturer[[:space:]]Guidance[[:space:]]for[[:space:]]Securable[[:space:]]Connected[[:space:]]Product[[:space:]]Development”.pdf filter=lfs diff=lfs merge=lfs -text Derived[[:space:]]PIV[[:space:]]Application[[:space:]]and[[:space:]]Data[[:space:]]Model[[:space:]]Test[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text ISCMA_[[:space:]]An[[:space:]]Information[[:space:]]Security[[:space:]]Continuous[[:space:]]Monitoring[[:space:]]Program[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Common[[:space:]]Misuse[[:space:]]Scoring[[:space:]]System[[:space:]](CMSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Feature[[:space:]]Misuse[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Three[[:space:]]Variants[[:space:]]of[[:space:]]Ciphertext[[:space:]]Stealing[[:space:]]for[[:space:]]CBC[[:space:]]Mode.pdf filter=lfs diff=lfs merge=lfs -text Control[[:space:]]Baselines[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]on[[:space:]]the[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation[[:space:]]in[[:space:]]the[[:space:]]NIST[[:space:]]SP[[:space:]]800-38[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Bluetooth[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Common[[:space:]]Configuration[[:space:]]Scoring[[:space:]]System[[:space:]](CCSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Security[[:space:]]Configuration[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text Secure[[:space:]]Hash[[:space:]]Standard[[:space:]](SHS).pdf filter=lfs diff=lfs merge=lfs -text Assessing[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2012[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Ordered[[:space:]]t-way[[:space:]]Combinations[[:space:]]for[[:space:]]Testing[[:space:]]State-based[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text COTS[[:space:]]Security[[:space:]]Protection[[:space:]]Profile[[:space:]]-[[:space:]]Operating[[:space:]]Systems[[:space:]](CSPP-OS)[[:space:]](Worked[[:space:]]Example[[:space:]]Applying[[:space:]]Guidance[[:space:]]of[[:space:]]NISTIR-6462,[[:space:]]CSPP)[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text Cybersecurity[[:space:]]Framework[[:space:]]Profile[[:space:]]for[[:space:]]Electric[[:space:]]Vehicle[[:space:]]Extreme[[:space:]]Fast[[:space:]]Charging[[:space:]]Infrastructure.pdf filter=lfs diff=lfs merge=lfs -text 5th[[:space:]]Annual[[:space:]]PKI[[:space:]]R&D[[:space:]]Workshop[[:space:]]_Making[[:space:]]PKI[[:space:]]Easy[[:space:]]to[[:space:]]Use_[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text Data[[:space:]]Confidentiality_[[:space:]]Identifying[[:space:]]and[[:space:]]Protecting[[:space:]]Assets[[:space:]]Against[[:space:]]Data[[:space:]]Breaches.pdf filter=lfs diff=lfs merge=lfs -text Building[[:space:]]a[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Learning[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text Foundational[[:space:]]PNT[[:space:]]Profile_[[:space:]]Applying[[:space:]]the[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]for[[:space:]]the[[:space:]]Responsible[[:space:]]Use[[:space:]]of[[:space:]]Positioning,[[:space:]]Navigation,[[:space:]]and[[:space:]]Timing[[:space:]](PNT)[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Review[[:space:]]of[[:space:]]U.S.[[:space:]]and[[:space:]]European[[:space:]]Security[[:space:]]Evaluation[[:space:]]Criteria.pdf filter=lfs diff=lfs merge=lfs -text Methodology[[:space:]]for[[:space:]]Characterizing[[:space:]]Network[[:space:]]Behavior[[:space:]]of[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]]Devices.pdf filter=lfs diff=lfs merge=lfs -text IoT[[:space:]]Device[[:space:]]Cybersecurity[[:space:]]Guidance[[:space:]]for[[:space:]]the[[:space:]]Federal[[:space:]]Government_[[:space:]]Establishing[[:space:]]IoT[[:space:]]Device[[:space:]]Cybersecurity[[:space:]]Requirements.pdf filter=lfs diff=lfs merge=lfs -text National[[:space:]]Online[[:space:]]Informative[[:space:]]References[[:space:]](OLIR)[[:space:]]Program_[[:space:]]Overview,[[:space:]]Benefits,[[:space:]]and[[:space:]]Use.pdf filter=lfs diff=lfs merge=lfs -text Data[[:space:]]Confidentiality_[[:space:]]Detect,[[:space:]]Respond[[:space:]]to,[[:space:]]and[[:space:]]Recover[[:space:]]from[[:space:]]Data[[:space:]]Breaches.pdf filter=lfs diff=lfs merge=lfs -text Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]of[[:space:]]Federal[[:space:]]Employees[[:space:]]and[[:space:]]Contractors.pdf filter=lfs diff=lfs merge=lfs -text Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)-Approved[[:space:]]Sensitive[[:space:]]Security[[:space:]]Parameter[[:space:]]Generation[[:space:]]and[[:space:]]Establishment[[:space:]]Methods_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]U.pdf filter=lfs diff=lfs merge=lfs -text 2020[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text PBX[[:space:]]Administrator’s[[:space:]]Security[[:space:]]Standards.pdf filter=lfs diff=lfs merge=lfs -text Recommended[[:space:]]Criteria[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Labeling[[:space:]]for[[:space:]]Consumer[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]](IoT)[[:space:]]Products.pdf filter=lfs diff=lfs merge=lfs -text Notional[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management[[:space:]]Practices[[:space:]]for[[:space:]]Federal[[:space:]]Information[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security_[[:space:]]Selected[[:space:]]Articles.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Pair-Wise[[:space:]]Key-Establishment[[:space:]]Using[[:space:]]Integer[[:space:]]Factorization[[:space:]]Cryptography.pdf filter=lfs diff=lfs merge=lfs -text Cybersecurity[[:space:]]Framework[[:space:]]Manufacturing[[:space:]]Profile[[:space:]]Low[[:space:]]Impact[[:space:]]Level[[:space:]]Example[[:space:]]Implementations[[:space:]]Guide_[[:space:]]Volume[[:space:]]2[[:space:]]–[[:space:]]Process-based[[:space:]]Manufacturing[[:space:]]System[[:space:]]Use[[:space:]]Case.pdf filter=lfs diff=lfs merge=lfs -text Stateless[[:space:]]Hash-Based[[:space:]]Digital[[:space:]]Signature[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text Benefits[[:space:]]of[[:space:]]an[[:space:]]Updated[[:space:]]Mapping[[:space:]]between[[:space:]]the[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]and[[:space:]]the[[:space:]]NERC[[:space:]]Critical[[:space:]]Infrastructure[[:space:]]Protection[[:space:]]Standards.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Survey[[:space:]]of[[:space:]]Remote[[:space:]]Monitoring.pdf filter=lfs diff=lfs merge=lfs -text Secure[[:space:]]Virtual[[:space:]]Network[[:space:]]Configuration[[:space:]]for[[:space:]]Virtual[[:space:]]Machine[[:space:]](VM)[[:space:]]Protection.pdf filter=lfs diff=lfs merge=lfs -text Workforce[[:space:]]Framework[[:space:]]for[[:space:]]Cybersecurity[[:space:]](NICE[[:space:]]Framework).pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Galois_Counter[[:space:]]Mode[[:space:]](GCM)[[:space:]]and[[:space:]]GMAC.pdf filter=lfs diff=lfs merge=lfs -text CMVP[[:space:]]Documentation[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759.pdf filter=lfs diff=lfs merge=lfs -text Requirements[[:space:]]for[[:space:]]Cryptographic[[:space:]]Accordions.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]the[[:space:]]CMAC[[:space:]]Mode[[:space:]]for[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Workshop[[:space:]]on[[:space:]]the[[:space:]]Requirements[[:space:]]for[[:space:]]an[[:space:]]Accordion[[:space:]]Cipher[[:space:]]Mode[[:space:]]2024_[[:space:]]Workshop[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Blockchain[[:space:]]Networks_[[:space:]]Token[[:space:]]Design[[:space:]]and[[:space:]]Management[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Guidelines[[:space:]]for[[:space:]]Storage[[:space:]]Infrastructure.pdf filter=lfs diff=lfs merge=lfs -text Symmetric[[:space:]]Key[[:space:]]Injection[[:space:]]onto[[:space:]]Smart[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text Enhanced[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information_[[:space:]]A[[:space:]]Supplement[[:space:]]to[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171.pdf filter=lfs diff=lfs merge=lfs -text CMVP[[:space:]]Approved[[:space:]]Authentication[[:space:]]Mechanisms_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Requirements[[:space:]]for[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Annex[[:space:]]E[[:space:]]and[[:space:]]ISO_IEC[[:space:]]24579[[:space:]]Section[[:space:]]6.17.pdf filter=lfs diff=lfs merge=lfs -text Forensics[[:space:]]Web[[:space:]]Services[[:space:]](FWS).pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Roadmap[[:space:]]Toward[[:space:]]Criteria[[:space:]]for[[:space:]]Threshold[[:space:]]Schemes[[:space:]]for[[:space:]]Cryptographic[[:space:]]Primitives.pdf filter=lfs diff=lfs merge=lfs -text Conformance[[:space:]]Test[[:space:]]Architecture[[:space:]]and[[:space:]]Test[[:space:]]Suite[[:space:]]for[[:space:]]ANSI_NIST-ITL[[:space:]]1-2007.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Methodology[[:space:]]for[[:space:]]Developing[[:space:]]Authentication[[:space:]]Assurance[[:space:]]Level[[:space:]]Taxonomy[[:space:]]for[[:space:]]Smart[[:space:]]Card-based[[:space:]]Identity[[:space:]]Verification.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Applications[[:space:]]Using[[:space:]]Approved[[:space:]]Hash[[:space:]]Algorithms.pdf filter=lfs diff=lfs merge=lfs -text Bug[[:space:]]Framework[[:space:]](BF)_[[:space:]]Formalizing[[:space:]]Cybersecurity[[:space:]]Weaknesses[[:space:]]and[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Storage[[:space:]]Encryption[[:space:]]Technologies[[:space:]]for[[:space:]]End[[:space:]]User[[:space:]]Devices.pdf filter=lfs diff=lfs merge=lfs -text Manufacturing[[:space:]]Profile[[:space:]]Implementation[[:space:]]Methodology[[:space:]]for[[:space:]]a[[:space:]]Robotic[[:space:]]Workcell.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]LTE[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Case[[:space:]]Studies[[:space:]]in[[:space:]]Cyber[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management_[[:space:]]Anonymous[[:space:]]Renewable[[:space:]]Energy[[:space:]]Company.pdf filter=lfs diff=lfs merge=lfs -text Trusted[[:space:]]Cloud_[[:space:]]Security[[:space:]]Practice[[:space:]]Guide[[:space:]]for[[:space:]]VMware[[:space:]]Hybrid[[:space:]]Cloud[[:space:]]Infrastructure[[:space:]]as[[:space:]]a[[:space:]]Service[[:space:]](IaaS)[[:space:]]Environments.pdf filter=lfs diff=lfs merge=lfs -text Fingerprint[[:space:]]Identification[[:space:]]and[[:space:]]Mobile[[:space:]]Handheld[[:space:]]Devices_[[:space:]]An[[:space:]]Overview[[:space:]]and[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text BIOS[[:space:]]Protection[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text Measuring[[:space:]]the[[:space:]]Common[[:space:]]Vulnerability[[:space:]]Scoring[[:space:]]System[[:space:]]Base[[:space:]]Score[[:space:]]Equation.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]API[[:space:]]Protection[[:space:]]for[[:space:]]Cloud-Native[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text Measuring[[:space:]]the[[:space:]]Usability[[:space:]]and[[:space:]]Security[[:space:]]of[[:space:]]Permuted[[:space:]]Passwords[[:space:]]on[[:space:]]Mobile[[:space:]]Platforms.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Integrating[[:space:]]Forensic[[:space:]]Techniques[[:space:]]into[[:space:]]Incident[[:space:]]Response.pdf filter=lfs diff=lfs merge=lfs -text Interagency[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Status[[:space:]]of[[:space:]]International[[:space:]]Cybersecurity[[:space:]]Standardization[[:space:]]for[[:space:]]the[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]](IoT).pdf filter=lfs diff=lfs merge=lfs -text Case[[:space:]]Studies[[:space:]]in[[:space:]]Cyber[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management_[[:space:]]Seagate[[:space:]]Technology.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Test,[[:space:]]Training,[[:space:]]and[[:space:]]Exercise[[:space:]]Programs[[:space:]]for[[:space:]]IT[[:space:]]Plans[[:space:]]and[[:space:]]Capabilities.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Computer[[:space:]]Security[[:space:]]Log[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text Module-Lattice-Based[[:space:]]Key-Encapsulation[[:space:]]Mechanism[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cloud[[:space:]]Computing[[:space:]]Forensic[[:space:]]Science[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Issues[[:space:]]&[[:space:]]Challenges[[:space:]]in[[:space:]]Cloud[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text BioCTS[[:space:]]2012_[[:space:]]Advanced[[:space:]]Conformance[[:space:]]Test[[:space:]]Architectures[[:space:]]and[[:space:]]Test[[:space:]]Suites[[:space:]]for[[:space:]]Biometric[[:space:]]Data[[:space:]]Interchange[[:space:]]Formats[[:space:]]and[[:space:]]Biometric[[:space:]]Information[[:space:]]Records.pdf filter=lfs diff=lfs merge=lfs -text 2016[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Strategies[[:space:]]for[[:space:]]the[[:space:]]Integration[[:space:]]of[[:space:]]Software[[:space:]]Supply[[:space:]]Chain[[:space:]]Security[[:space:]]in[[:space:]]DevSecOps[[:space:]]CI_CD[[:space:]]Pipelines.pdf filter=lfs diff=lfs merge=lfs -text Securing[[:space:]]Telehealth[[:space:]]Remote[[:space:]]Patient[[:space:]]Monitoring[[:space:]]Ecosystem.pdf filter=lfs diff=lfs merge=lfs -text Performance[[:space:]]Assurance[[:space:]]and[[:space:]]Data[[:space:]]Integrity[[:space:]]Practices.pdf filter=lfs diff=lfs merge=lfs -text Audit[[:space:]]and[[:space:]]Evaluation[[:space:]]of[[:space:]]Computer[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Taxonomic[[:space:]]Rules[[:space:]]for[[:space:]]Password[[:space:]]Policies_[[:space:]]Translating[[:space:]]the[[:space:]]Informal[[:space:]]to[[:space:]]the[[:space:]]Formal[[:space:]]Language.pdf filter=lfs diff=lfs merge=lfs -text Message[[:space:]]Authentication[[:space:]]Code[[:space:]](MAC)[[:space:]]Validation[[:space:]]System_[[:space:]]Requirements[[:space:]]and[[:space:]]Procedures.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Privacy[[:space:]]Framework_[[:space:]]A[[:space:]]Tool[[:space:]]for[[:space:]]Improving[[:space:]]Privacy[[:space:]]Through[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management,[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2013[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Addressing[[:space:]]Visibility[[:space:]]Challenges[[:space:]]with[[:space:]]TLS[[:space:]]1.3[[:space:]]within[[:space:]]the[[:space:]]Enterprise_[[:space:]]High-Level[[:space:]]Document.pdf filter=lfs diff=lfs merge=lfs -text Assessing[[:space:]]Federal[[:space:]]and[[:space:]]Commercial[[:space:]]Information[[:space:]]Security[[:space:]]Needs.pdf filter=lfs diff=lfs merge=lfs -text Assessing[[:space:]]Security[[:space:]]and[[:space:]]Privacy[[:space:]]Controls[[:space:]]in[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text Cybersecurity[[:space:]]Framework[[:space:]]Profile[[:space:]]for[[:space:]]Liquefied[[:space:]]Natural[[:space:]]Gas.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]the[[:space:]]Entropy[[:space:]]Sources[[:space:]]Used[[:space:]]for[[:space:]]Random[[:space:]]Bit[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]of[[:space:]]the[[:space:]]Workshop[[:space:]]on[[:space:]]Cryptography[[:space:]]in[[:space:]]Support[[:space:]]of[[:space:]]Computer[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]the[[:space:]]Authorization[[:space:]]of[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]]Card[[:space:]]Issuers[[:space:]](PCI)[[:space:]]and[[:space:]]Derived[[:space:]]PIV[[:space:]]Credential[[:space:]]Issuers[[:space:]](DPCI).pdf filter=lfs diff=lfs merge=lfs -text Conformance[[:space:]]Test[[:space:]]Architecture[[:space:]]for[[:space:]]Biometric[[:space:]]Data[[:space:]]Interchange[[:space:]]Formats[[:space:]]-[[:space:]]Version[[:space:]]Beta[[:space:]]2.0.pdf filter=lfs diff=lfs merge=lfs -text Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Fourth[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text NIST_SP_800-53r5_Security_Privacy_Controls.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]Media[[:space:]]Sanitization.pdf filter=lfs diff=lfs merge=lfs -text Getting[[:space:]]Started[[:space:]]with[[:space:]]the[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]Framework_[[:space:]]A[[:space:]]Quick[[:space:]]Start[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text BIOS[[:space:]]Protection[[:space:]]Guidelines[[:space:]]for[[:space:]]Servers.pdf filter=lfs diff=lfs merge=lfs -text Representation[[:space:]]of[[:space:]]PIV[[:space:]]Chain-of-Trust[[:space:]]for[[:space:]]Import[[:space:]]and[[:space:]]Export.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Technical[[:space:]]Specification[[:space:]]for[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)_[[:space:]]SCAP[[:space:]]Version[[:space:]]1.2.pdf filter=lfs diff=lfs merge=lfs -text An[[:space:]]Analysis[[:space:]]of[[:space:]]Computer[[:space:]]Security[[:space:]]Safeguards[[:space:]]for[[:space:]]Detecting[[:space:]]and[[:space:]]Preventing[[:space:]]Intentional[[:space:]]Computer[[:space:]]Misuse.pdf filter=lfs diff=lfs merge=lfs -text Metrics[[:space:]]and[[:space:]]Methodology[[:space:]]for[[:space:]]Hardware[[:space:]]Security[[:space:]]Constructs.pdf filter=lfs diff=lfs merge=lfs -text Analyzing[[:space:]]Collusion[[:space:]]Threats[[:space:]]in[[:space:]]the[[:space:]]Semiconductor[[:space:]]Supply[[:space:]]Chain.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]on[[:space:]]Mobile[[:space:]]Device[[:space:]]Forensics.pdf filter=lfs diff=lfs merge=lfs -text Engineering[[:space:]]Trustworthy[[:space:]]Secure[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text Zero[[:space:]]Trust[[:space:]]Architecture.pdf filter=lfs diff=lfs merge=lfs -text Case[[:space:]]Studies[[:space:]]in[[:space:]]Cyber[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management_[[:space:]]Anonymous[[:space:]]Consumer[[:space:]]Electronics[[:space:]]Company.pdf filter=lfs diff=lfs merge=lfs -text Hardware-Enabled[[:space:]]Security_[[:space:]]Policy-Based[[:space:]]Governance[[:space:]]in[[:space:]]Trusted[[:space:]]Container[[:space:]]Platforms.pdf filter=lfs diff=lfs merge=lfs -text Enterprise[[:space:]]Impact[[:space:]]of[[:space:]]Information[[:space:]]and[[:space:]]Communications[[:space:]]Technology[[:space:]]Risk_[[:space:]]Governing[[:space:]]and[[:space:]]Managing[[:space:]]ICT[[:space:]]Risk[[:space:]]Programs[[:space:]]Within[[:space:]]an[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Portfolio.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]for[[:space:]]Dial-Up[[:space:]]Lines.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]of[[:space:]]SQL-Based[[:space:]]Implementations[[:space:]]of[[:space:]]Product[[:space:]]Data[[:space:]]Exchange[[:space:]]Using[[:space:]]STEP.pdf filter=lfs diff=lfs merge=lfs -text Secure[[:space:]]Biometric[[:space:]]Match-on-Card[[:space:]]Feasibility[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Workshop[[:space:]]Summary[[:space:]]Report[[:space:]]for[[:space:]]“Building[[:space:]]the[[:space:]]Federal[[:space:]]Profile[[:space:]]For[[:space:]]IoT[[:space:]]Device[[:space:]]Cybersecurity”[[:space:]]Virtual[[:space:]]Workshop.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2009[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text IoT[[:space:]]Non-Technical[[:space:]]Supporting[[:space:]]Capability[[:space:]]Core[[:space:]]Baseline.pdf filter=lfs diff=lfs merge=lfs -text Understanding[[:space:]]Stablecoin[[:space:]]Technology[[:space:]]and[[:space:]]Related[[:space:]]Security[[:space:]]Considerations.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Requirements[[:space:]]for[[:space:]]Cryptographic[[:space:]]Modules.pdf filter=lfs diff=lfs merge=lfs -text Privacy[[:space:]]Protection[[:space:]]in[[:space:]]the[[:space:]]United[[:space:]]States_[[:space:]]A[[:space:]]1991[[:space:]]Survey[[:space:]]of[[:space:]]Laws[[:space:]]and[[:space:]]Regulations[[:space:]]Affecting[[:space:]]Privacy[[:space:]]in[[:space:]]the[[:space:]]Public[[:space:]]and[[:space:]]Private[[:space:]]Sector[[:space:]]Including[[:space:]]a[[:space:]]List[[:space:]]of[[:space:]].pdf filter=lfs diff=lfs merge=lfs -text Module-Lattice-Based[[:space:]]Digital[[:space:]]Signature[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text Minimum[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Multi-User[[:space:]]Operating[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text Incident[[:space:]]Response[[:space:]]Recommendations[[:space:]]and[[:space:]]Considerations[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]Management_[[:space:]]A[[:space:]]CSF[[:space:]]2.0[[:space:]]Community[[:space:]]Profile.pdf filter=lfs diff=lfs merge=lfs -text Mapping[[:space:]]Relationships[[:space:]]Between[[:space:]]Documentary[[:space:]]Standards,[[:space:]]Regulations,[[:space:]]Frameworks,[[:space:]]and[[:space:]]Guidelines_[[:space:]]Developing[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Concept[[:space:]]Mappings.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2015[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Protecting[[:space:]]the[[:space:]]Confidentiality[[:space:]]of[[:space:]]Personally[[:space:]]Identifiable[[:space:]]Information[[:space:]](PII).pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]SIMfill[[:space:]]Use[[:space:]]and[[:space:]]Development.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]for[[:space:]]Mapping[[:space:]]Types[[:space:]]of[[:space:]]Information[[:space:]]and[[:space:]]Information[[:space:]]Systems[[:space:]]to[[:space:]]Security[[:space:]]Categories_[[:space:]]Appendices.pdf filter=lfs diff=lfs merge=lfs -text Supplemental[[:space:]]Information[[:space:]]for[[:space:]]the[[:space:]]Interagency[[:space:]]Report[[:space:]]on[[:space:]]Strategic[[:space:]]U.S.[[:space:]]Government[[:space:]]Engagement[[:space:]]in[[:space:]]International[[:space:]]Standardization[[:space:]]to[[:space:]]Achieve[[:space:]]U.S.[[:space:]]Objective.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Key-Derivation[[:space:]]Methods[[:space:]]in[[:space:]]Key-Establishment[[:space:]]Schemes.pdf filter=lfs diff=lfs merge=lfs -text Workshop[[:space:]]on[[:space:]]Security[[:space:]]Procedures[[:space:]]for[[:space:]]the[[:space:]]Interchange[[:space:]]of[[:space:]]Electronic[[:space:]]Documents_[[:space:]]Selected[[:space:]]Papers[[:space:]]and[[:space:]]Results.pdf filter=lfs diff=lfs merge=lfs -text Guideline[[:space:]]for[[:space:]]Identifying[[:space:]]an[[:space:]]Information[[:space:]]System[[:space:]]as[[:space:]]a[[:space:]]National[[:space:]]Security[[:space:]]System.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Resource[[:space:]]and[[:space:]]Overview[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text Securing[[:space:]]Web[[:space:]]Transactions_[[:space:]]TLS[[:space:]]Server[[:space:]]Certificate[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text Recommended[[:space:]]Criteria[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Labeling[[:space:]]of[[:space:]]Consumer[[:space:]]Software.pdf filter=lfs diff=lfs merge=lfs -text Criticality[[:space:]]Analysis[[:space:]]Process[[:space:]]Model_[[:space:]]Prioritizing[[:space:]]Systems[[:space:]]and[[:space:]]Components.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Technical[[:space:]]Specification[[:space:]]for[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)_[[:space:]]SCAP[[:space:]]Version[[:space:]]1.3.pdf filter=lfs diff=lfs merge=lfs -text Key[[:space:]]Performance[[:space:]]Indicators[[:space:]]for[[:space:]]Process[[:space:]]Control[[:space:]]System[[:space:]]Cybersecurity[[:space:]]Performance[[:space:]]Analysis.pdf filter=lfs diff=lfs merge=lfs -text Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Methods[[:space:]]for[[:space:]]Key[[:space:]]Wrapping.pdf filter=lfs diff=lfs merge=lfs -text Third-Round[[:space:]]Report[[:space:]]of[[:space:]]the[[:space:]]SHA-3[[:space:]]Cryptographic[[:space:]]Hash[[:space:]]Algorithm[[:space:]]Competition.pdf filter=lfs diff=lfs merge=lfs -text SHA-3[[:space:]]Derived[[:space:]]Functions_[[:space:]]cSHAKE,[[:space:]]KMAC,[[:space:]]TupleHash,[[:space:]]and[[:space:]]ParallelHash.pdf filter=lfs diff=lfs merge=lfs -text Personal[[:space:]]Identity[[:space:]]Verification[[:space:]]Demonstration[[:space:]]Summary.pdf filter=lfs diff=lfs merge=lfs -text Maintaining[[:space:]]and[[:space:]]Using[[:space:]]Key[[:space:]]History[[:space:]]on[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text Hardware-Enabled[[:space:]]Security_[[:space:]]Container[[:space:]]Platform[[:space:]]Security[[:space:]]Prototype.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Technical[[:space:]]Specification[[:space:]]for[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)_[[:space:]]SCAP[[:space:]]Version[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Comparison[[:space:]]of[[:space:]]Attribute[[:space:]]Based[[:space:]]Access[[:space:]]Control[[:space:]](ABAC)[[:space:]]Standards[[:space:]]for[[:space:]]Data[[:space:]]Service[[:space:]]Applications_[[:space:]]Extensible[[:space:]]Access[[:space:]]Control[[:space:]]Markup[[:space:]]Language[[:space:]](XACML)[[:space:]]and[[:space:]]N.pdf filter=lfs diff=lfs merge=lfs -text Collaborative[[:space:]]Vulnerability[[:space:]]Metadata[[:space:]]Acceptance[[:space:]]Process[[:space:]](CVMAP)[[:space:]]for[[:space:]]CVE[[:space:]]Numbering[[:space:]]Authorities[[:space:]](CNAs)[[:space:]]and[[:space:]]Authorized[[:space:]]Data[[:space:]]Publishers.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Workshop[[:space:]]on[[:space:]]Digital[[:space:]]Signature[[:space:]]Certificate[[:space:]]Management,[[:space:]]December[[:space:]]10-11,[[:space:]]1992.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Privilege[[:space:]](Access)[[:space:]]Management[[:space:]]Workshop.pdf filter=lfs diff=lfs merge=lfs -text Common[[:space:]]Biometric[[:space:]]Exchange[[:space:]]Formats[[:space:]]Framework[[:space:]](CBEFF).pdf filter=lfs diff=lfs merge=lfs -text NIST_SP_800-207_Zero_Trust_Architecture.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]](CSF)[[:space:]]2.0.pdf filter=lfs diff=lfs merge=lfs -text Combinatorial[[:space:]]Coverage[[:space:]]Measurement.pdf filter=lfs diff=lfs merge=lfs -text Mobile[[:space:]]Application[[:space:]]Single[[:space:]]Sign-On_[[:space:]]Improving[[:space:]]Authentication[[:space:]]for[[:space:]]Public[[:space:]]Safety[[:space:]]First[[:space:]]Responders.pdf filter=lfs diff=lfs merge=lfs -text Mobile[[:space:]]Forensic[[:space:]]Reference[[:space:]]Materials_[[:space:]]a[[:space:]]Methodology[[:space:]]and[[:space:]]Reification.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]to[[:space:]]Operational[[:space:]]Technology[[:space:]](OT)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Automated[[:space:]]Information[[:space:]]System[[:space:]]Security[[:space:]]Accreditation[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text Guidelines[[:space:]]for[[:space:]]Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]First[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Lightweight[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text Specification[[:space:]]for[[:space:]]the[[:space:]]Extensible[[:space:]]Configuration[[:space:]]Checklist[[:space:]]Description[[:space:]]Format[[:space:]](XCCDF)[[:space:]]Version[[:space:]]1.1.4.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Event[[:space:]]Recovery.pdf filter=lfs diff=lfs merge=lfs -text Domestic[[:space:]]Disaster[[:space:]]Recovery[[:space:]]Plan[[:space:]]for[[:space:]]PCs,[[:space:]]OIS,[[:space:]]and[[:space:]]Small[[:space:]]VS[[:space:]]systems.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Cybersecurity[[:space:]]Supply[[:space:]]Chain[[:space:]]Risk[[:space:]]Management[[:space:]](C-SCRM).pdf filter=lfs diff=lfs merge=lfs -text Machine[[:space:]]Learning[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policy[[:space:]]Verification.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cryptographic[[:space:]]Standards[[:space:]]and[[:space:]]Guidelines[[:space:]]Development[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text Approaches[[:space:]]for[[:space:]]Federal[[:space:]]Agencies[[:space:]]to[[:space:]]Use[[:space:]]the[[:space:]]Cybersecurity[[:space:]]Framework.pdf filter=lfs diff=lfs merge=lfs -text The[[:space:]]Use[[:space:]]of[[:space:]]Passwords[[:space:]]for[[:space:]]Controlled[[:space:]]Access[[:space:]]to[[:space:]]Computer[[:space:]]Resources.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2010[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Using[[:space:]]Business[[:space:]]Impact[[:space:]]Analysis[[:space:]]to[[:space:]]Inform[[:space:]]Risk[[:space:]]Prioritization[[:space:]]and[[:space:]]Response.pdf filter=lfs diff=lfs merge=lfs -text De-Identification[[:space:]]of[[:space:]]Personal[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text Advanced[[:space:]]Identity[[:space:]]Workshop[[:space:]]on[[:space:]]Applying[[:space:]]Measurement[[:space:]]Science[[:space:]]in[[:space:]]the[[:space:]]Identity[[:space:]]Ecosystem_[[:space:]][[:space:]]Summary[[:space:]]and[[:space:]]Next[[:space:]]Steps.pdf filter=lfs diff=lfs merge=lfs -text Approaches[[:space:]]and[[:space:]]Challenges[[:space:]]of[[:space:]]Federal[[:space:]]Cybersecurity[[:space:]]Awareness[[:space:]]Programs.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Recommendations[[:space:]]for[[:space:]]Server-based[[:space:]]Hypervisor[[:space:]]Platforms.pdf filter=lfs diff=lfs merge=lfs -text General[[:space:]]Procedures[[:space:]]for[[:space:]]Registering[[:space:]]Computer[[:space:]]Security[[:space:]]Objects.pdf filter=lfs diff=lfs merge=lfs -text Building[[:space:]]Secure[[:space:]]Microservices-based[[:space:]]Applications[[:space:]]Using[[:space:]]Service-Mesh[[:space:]]Architecture.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]of[[:space:]]the[[:space:]]Workshop[[:space:]]on[[:space:]]Estimation[[:space:]]of[[:space:]]Significant[[:space:]]Advances[[:space:]]in[[:space:]]Computer[[:space:]]Technology.pdf filter=lfs diff=lfs merge=lfs -text IT[[:space:]]Asset[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Study[[:space:]]of[[:space:]]OSI[[:space:]]Key[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]on[[:space:]]Secure[[:space:]]Hardware[[:space:]]Assurance[[:space:]]Reference[[:space:]]Dataset[[:space:]](SHARD)[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text Foundations[[:space:]]of[[:space:]]a[[:space:]]Security[[:space:]]Policy[[:space:]]for[[:space:]]Use[[:space:]]of[[:space:]]the[[:space:]]National[[:space:]]Research[[:space:]]and[[:space:]]Educational[[:space:]]Network.pdf filter=lfs diff=lfs merge=lfs -text Reducing[[:space:]]the[[:space:]]Cybersecurity[[:space:]]Risks[[:space:]]of[[:space:]]Portable[[:space:]]Storage[[:space:]]Media[[:space:]]in[[:space:]]OT[[:space:]]Environments.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Zero[[:space:]]Trust[[:space:]]Architecture[[:space:]]Model[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]in[[:space:]]Cloud-Native[[:space:]]Applications[[:space:]]in[[:space:]]Multi-Cloud[[:space:]]Environments.pdf filter=lfs diff=lfs merge=lfs -text Securing[[:space:]]Distributed[[:space:]]Energy[[:space:]]Resources_[[:space:]]An[[:space:]]Example[[:space:]]of[[:space:]]Industrial[[:space:]]Internet[[:space:]]of[[:space:]]Things[[:space:]]Cybersecurity.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Statistical[[:space:]]Test[[:space:]]Suite[[:space:]]for[[:space:]]Random[[:space:]]and[[:space:]]Pseudorandom[[:space:]]Number[[:space:]]Generators[[:space:]]for[[:space:]]Cryptographic[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text Measurement[[:space:]]Guide[[:space:]]for[[:space:]]Information[[:space:]]Security_[[:space:]]Volume[[:space:]]1[[:space:]]—[[:space:]]Identifying[[:space:]]and[[:space:]]Selecting[[:space:]]Measures.pdf filter=lfs diff=lfs merge=lfs -text Workshop[[:space:]]Summary[[:space:]]Report[[:space:]]for[[:space:]]“Building[[:space:]]on[[:space:]]the[[:space:]]NIST[[:space:]]Foundations_[[:space:]]Next[[:space:]]Steps[[:space:]]in[[:space:]]IoT[[:space:]]Cybersecurity”.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]and[[:space:]]Privacy[[:space:]]Controls[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text NICE[[:space:]]Framework[[:space:]]Competency[[:space:]]Areas_[[:space:]]Preparing[[:space:]]a[[:space:]]Job-Ready[[:space:]]Cybersecurity[[:space:]]Workforce.pdf filter=lfs diff=lfs merge=lfs -text Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]1.2[[:space:]]Validation[[:space:]]Program[[:space:]]Test[[:space:]]Requirements.pdf filter=lfs diff=lfs merge=lfs -text Domain[[:space:]]Name[[:space:]]System-Based[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Planning[[:space:]]for[[:space:]]a[[:space:]]Zero[[:space:]]Trust[[:space:]]Architecture_[[:space:]]A[[:space:]]Planning[[:space:]]Guide[[:space:]]for[[:space:]]Federal[[:space:]]Administrators.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2008[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Securing[[:space:]]Electronic[[:space:]]Health[[:space:]]Records[[:space:]]on[[:space:]]Mobile[[:space:]]Devices.pdf filter=lfs diff=lfs merge=lfs -text Recommendations[[:space:]]for[[:space:]]Federal[[:space:]]Vulnerability[[:space:]]Disclosure[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text Measurement[[:space:]]Guide[[:space:]]for[[:space:]]Information[[:space:]]Security_[[:space:]]Volume[[:space:]]2[[:space:]]—[[:space:]]Developing[[:space:]]an[[:space:]]Information[[:space:]]Security[[:space:]]Measurement[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Second[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]SHA-3[[:space:]]Cryptographic[[:space:]]Hash[[:space:]]Algorithm[[:space:]]Competition.pdf filter=lfs diff=lfs merge=lfs -text FIPS[[:space:]]140-3[[:space:]]Derived[[:space:]]Test[[:space:]]Requirements[[:space:]](DTR)_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759.pdf filter=lfs diff=lfs merge=lfs -text Getting[[:space:]]Ready[[:space:]]for[[:space:]]Post-Quantum[[:space:]]Cryptography_[[:space:]]Exploring[[:space:]]Challenges[[:space:]]Associated[[:space:]]with[[:space:]]Adopting[[:space:]]and[[:space:]]Using[[:space:]]Post-Quantum[[:space:]]Cryptographic[[:space:]]Algorithms.pdf filter=lfs diff=lfs merge=lfs -text Report[[:space:]]of[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]on[[:space:]]Usable[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]for[[:space:]]Immersive[[:space:]]Technologies.pdf filter=lfs diff=lfs merge=lfs -text NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Creating[[:space:]]and[[:space:]]Using[[:space:]]Organizational[[:space:]]Profiles.pdf filter=lfs diff=lfs merge=lfs -text Computer[[:space:]]Security[[:space:]]Division[[:space:]]2014[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text Risk[[:space:]]Management[[:space:]]Framework[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations_[[:space:]]A[[:space:]]System[[:space:]]Life[[:space:]]Cycle[[:space:]]Approach[[:space:]]for[[:space:]]Security[[:space:]]and[[:space:]]Privacy.pdf filter=lfs diff=lfs merge=lfs -text Guide[[:space:]]for[[:space:]]Security-Focused[[:space:]]Configuration[[:space:]]Management[[:space:]]of[[:space:]]Information[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text CVSS[[:space:]]Implementation[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text A[[:space:]]Roadmap[[:space:]]for[[:space:]]Successful[[:space:]]Regional[[:space:]]Alliances[[:space:]]and[[:space:]]Multistakeholder[[:space:]]Partnerships[[:space:]]to[[:space:]]Build[[:space:]]the[[:space:]]Cybersecurity[[:space:]]Workforce.pdf filter=lfs diff=lfs merge=lfs -text Non-Fungible[[:space:]]Token[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text Fiscal[[:space:]]Year[[:space:]]2023[[:space:]]Cybersecurity[[:space:]]and[[:space:]]Privacy[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text