![]() |
Network Security White Papers
Group
|
Document Version
|
Target Models
|
||
A
|
v. A.1.2
|
Model A-C3, A-C3e/f, Model B-C2, Model R-C3,
Model C-P1, Model K-P3, Model K-C2, Model J-C1, Model S-C2 |
||
B
|
v. B.1.0
|
Model J-P3, Model PL-P1 | ||
C
|
v. C.1.1
|
Model C-P2c, Model G-P1, Model J-C2, Model K-P4, Model MT-C2, Model MT-P1, Model TH-C1, Model V-C1 | ||
D
|
v. D.1.1
|
Model A-C4, Model R-C4, Model J-P4, Model A-C4.5, Model R-C4.5 | ||
E
|
v. E.1.2
|
Model AT-C1, Model AP-C1, Model B-C3, Model MT-C3, Model PG-C1, Model G-P2, Model A-P4, Model AP-P1, Model MT-P2, Model S-C3, Model K-C3 | ||
F
|
v. F.1.0
|
Model SI-P1 | ||
G
|
v. G.1.2
|
Model Al-C1, Model R-C5, Model V-C2, Model Al-P1, Model Al-C1.5, Model R-C5.5 | ||
H
|
v. H.1.1
|
Model G-P3, Model AT-C2, Model AP-C2, Model DI-C1, Model DI-C1L | ||
I
|
v. I.1.1
|
Model Kr-P2, Model S-C4, Model MT-C4, Katana-C2, Model AP-P2, Model SI-P2 | ||
J
|
v. J.1.2
|
Model V-C3, Model Z-P1, Model N-C3, Model MD-P2 | ||
K
|
v. K.1.0
|
Model AT/AP-C2.5, Model Z-C1, Model DI-C1.5 |