Public Deliverables
The list of public deliverables of ERATOSTHENES has been included below.
ERATOSTHENES – D1.1 – Research Agenda, IoT threat landscape and sec challenges
ERATOSTHENES – D1.3 – Preliminary ERATOSTHENES Architecture
ERATOSTHENES – D2.1 – Trust Broker Mechanism
ERATOSTHENES – D3.3 – Design of Physical Unclonable Functions for IdM
ERATOSTHENES – D5.1 – First System Integration and Proof of Concept
ERATOSTHENES – D6.1 – Project website, social network, visual identity
ERATOSTHENES – D6.2 – Dissemination and Communication Plan
ERATOSTHENES – D7.1 – Project Management Handbook
ERATOSTHENES – D7.2 – Quality Plan and Risks Registry V1
ERATOSTHENES – D7.3 – Data Management Plan V1
ERATOSTHENES – D8.1 – H – Requirement No1
ERATOSTHENES – D8.2 – H.Requirement No2 – FINAL
ERATOSTHENES – D8.4- NEC – Requirement No. 5 v4
ERATOSTHENES – D6.3 – Capacity Building Programme and Planning – FINAL
ERATOSTHENES – D3.1- Prototype of Context-aware identity and access manager – FINAL
ERATOSTHENES – D3.2 – Prototype_of_Advanced_Data_Protection_Mechanism_v1.0 – FINAL
ERATOSTHENES – D7.7 – Quality Plan and Risks Registry v2
ERATOSTHENES – D6.7 – Workshops and Capacity building programme – 1st version
ERATOSTHENES – D6.6 – Plan on Standardization Activities
ERATOSTHENES – D6.5 – Plan on Contribution to IoT Cyber Security Certification Activities
ERATOSTHENES – D5.6 – Interim Report of Piloting Activities and Impact Assessment
ERATOSTHENES – D5.5 – Updated System integration
ERATOSTHENES – D5.4 – Cybersecurity Exercises and Trainings
ERATOSTHENES – D5.3 – Pilot 1 – POC Evaluation
ERATOSTHENES – D4.7 – AI Threat Analysis Models and Intrusion Detection for IoT Networks
ERATOSTHENES – D4.5 – Intrusion detection for IoT-based context and networks
ERATOSTHENES – D4.4 – Federated threat analysis models for continuous risk assessment
ERATOSTHENES – D4.3 – Inter-ledger platform for Cyber-threat information sharing
ERATOSTHENES – D4.2 – Secure deployment and registration of IoT devices
ERATOSTHENES – D3.7 – Identity Recovery Mechanisms
ERATOSTHENES – D3.5 – Updated version of the Identity and Access manager
ERATOSTHENES – D3.4 – DLT-based IoT Identity Manager
ERATOSTHENES – D2.5 – Trusted Execution of TBM on IoT-Edge devices
ERATOSTHENES – D2.3 – Updated Threat Modelling Module
ERATOSTHENES – D1.4 – ERATOSTHENES Blueprint – Final Architecture-1
ERATOSTHENES – D2.8_Interoperability layer with legacy infrastructure_v1.9
ERATOSTHENES – D2.6_Automated_Recovery_Mechanism_of_Trust_Manager_and_Broker_v1.0 – FINAL
ERATOSTHENES – D2.4 – Automatic Deployment Language And Tools for Trust Agents v2.3 – FINAL