2017
DOI: 10.17487/rfc8248
|View full text |Cite
|
Sign up to set email alerts
|

Security Automation and Continuous Monitoring (SACM) Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Beam transport through LEBT. The beam dynamics simulation of the LEBT has been performed using TRACEWIN [14] code as shown in figure 13. The measured emittance parameters at the ion source were used in simulation for obtaining the matched solenoid parameters.…”
Section: Resultsmentioning
confidence: 99%
“…Beam transport through LEBT. The beam dynamics simulation of the LEBT has been performed using TRACEWIN [14] code as shown in figure 13. The measured emittance parameters at the ion source were used in simulation for obtaining the matched solenoid parameters.…”
Section: Resultsmentioning
confidence: 99%
“…For example, requirement T-001 in the SACM Requirements document [RFC8248] notes that NEA can support data collection from endpoints within the broader SACM architecture. (Other parts of the NEA architecture, which SWIMA uses, meet the other SACM data transport requirements.)…”
Section: Relationship To Other Specificationsmentioning
confidence: 99%