Found 55 datasets matching filters.
-
AgentDojo-Inspect is a codebase created by the U.S. AI Safety Institute to facilitate research into agent hijacking and defenses against said hijacking. Agent hijacking is a type of indirect...
Search relevance: 1.00 | Views last month: 30 | Catalog Last Checked: August 02, 2025 at 03:53 PM -
The National Institute of Standards and Technology (NIST) provides a Cybersecurity Framework (CSF) for benchmarking and measuring the maturity level of cybersecurity programs across all...
Search relevance: 1.00 | Views last month: 27 | Catalog Last Checked: May 06, 2026 at 11:16 AM -
The National Institute of Standards and Technology (NIST) provides a Cybersecurity Framework (CSF) for benchmarking and measuring the maturity level of cybersecurity programs across all...
Search relevance: 1.00 | Views last month: 26 | Catalog Last Checked: May 06, 2026 at 11:16 AM -
This operations dashboard shows historic and current data related to this performance measure. The performance measure dashboard is available at 5.12 Cybersecurity. Data Dictionary
Search relevance: 1.00 | Views last month: 12 | Catalog Last Checked: May 06, 2026 at 11:17 AM -
The HireVue platform provides a virtual capability component to support face-to face interviews, online messaging capabilities, video chat recording, virtual informational booth areas for...
Search relevance: 1.00 | Views last month: 10 | Catalog Last Checked: May 06, 2026 at 11:12 AM -
This dataset conatins information about Operation Cyber Centurion (OCC), which disrupts hundreds of cyber intrusion and ransomware attacks that target critical infrastructure, such as major...
Search relevance: 1.00 | Views last month: 10 | Catalog Last Checked: May 06, 2026 at 11:13 AM -
High-level summary of all Services in the Catalog, filterable and searchable by parameterization. May be viewed in Tiles/Cards format or in List format. Catalog includes detailed information about...
Search relevance: 1.00 | Views last month: 8 | Catalog Last Checked: May 06, 2026 at 11:13 AM -
This 2019 Federal Cybersecurity Research and Development Strategic Plan supersedes the 2016 Federal Cybersecurity Research and Development Strategic Plan. The Plan aims to coordinate and guide...
Search relevance: 1.00 | Views last month: 8 | Catalog Last Checked: August 02, 2025 at 07:02 AM -
The purpose of this mapping is to provide the relationship between NIST Cybersecurity Framework (CSF) v1.1 and the NERC Critical Infrastructure Protection (CIP) Standards.Target Audience:The...
Search relevance: 1.00 | Views last month: 6 | Catalog Last Checked: August 02, 2025 at 03:34 PM -
NICE Framework components comprises Work Role Categories, Work Roles, Competency Areas, and Task, Knowledge, and Skill (TKS) statements as well as the relationships between those elements. The...
Search relevance: 1.00 | Views last month: 5 | Catalog Last Checked: August 02, 2025 at 02:38 PM -
The National Strategic Computing Initiative Update builds on the 2016 Strategic Computing Plan to enable focused and collaborative research, development, and deployment of future computing...
Search relevance: 1.00 | Views last month: 5 | Catalog Last Checked: August 02, 2025 at 07:02 AM -
High performance computing and computer communications networks are becoming increasingly important to scientific advancement, economic competition, and national security. The technology is...
Search relevance: 1.00 | Views last month: 3 | Catalog Last Checked: August 02, 2025 at 06:53 AM -
This document provides FY2019 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 3 | Catalog Last Checked: August 02, 2025 at 07:00 AM -
As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific discovery,industrial progress,...
Search relevance: 1.00 | Views last month: 2 | Catalog Last Checked: August 02, 2025 at 06:52 AM -
THIS DATASET IS OBSOLETE. PLEASE REFERENCE THE NEWER MAPPING IN OLIR (https://doi.org/10.18434/mds2-3215).The spreadsheets in this data set map National Institute of Standards and Technology...
Search relevance: 1.00 | Views last month: 2 | Catalog Last Checked: August 02, 2025 at 02:24 PM -
This document provides FY2020 implementation details for the 2016 Federal Cybersecurity Research and Development Strategic Plan...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 07:01 AM -
... The Director of the Office of Science and Technology Policy then provided a formal charge, asking PITAC members to concentrate their efforts on the focus, balance, and affectiveness of...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:56 AM -
The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of accomplishments to its credit. Throughout...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:53 AM -
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program defines a set of interrelated priorities for the agencies of the U.S. government that conduct...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 06:56 AM -
On June 4-6, 2019, the NSTC NITRD Program, in collaboration with the NSTC's MLAI Subcommittee, held a workshop to assess the research challenges and opportunities at the intersection of...
Search relevance: 1.00 | Views last month: 1 | Catalog Last Checked: August 02, 2025 at 07:02 AM