Deliverables

Public Deliverables

The list of public deliverables of ERATOSTHENES has been included below.

ERATOSTHENES – D1.1 – Research Agenda, IoT threat landscape and sec challenges

ERATOSTHENES – D1.3 – Preliminary ERATOSTHENES Architecture

ERATOSTHENES – D2.1 Trust Broker Mechanism

ERATOSTHENES – D3.3 – Design of Physical Unclonable Functions for IdM

ERATOSTHENES – D5.1 – First System Integration and Proof of Concept

ERATOSTHENES – D6.1 – Project website, social network, visual identity

ERATOSTHENESD6.2 – Dissemination and Communication Plan

ERATOSTHENES – D7.1 Project Management Handbook

ERATOSTHENES – D7.2 – Quality Plan and Risks Registry V1

ERATOSTHENES – D7.3 – Data Management Plan V1

ERATOSTHENES – D8.1 – H – Requirement No1 

ERATOSTHENES – D8.2 – H.Requirement No2 – FINAL

ERATOSTHENES – D8.4- NEC – Requirement No. 5 v4

ERATOSTHENES – D6.3 – Capacity Building Programme and Planning – FINAL

ERATOSTHENES – D3.1- Prototype of Context-aware identity and access manager – FINAL

ERATOSTHENES – D3.2 – Prototype_of_Advanced_Data_Protection_Mechanism_v1.0 – FINAL 

ERATOSTHENES – D7.7 – Quality Plan and Risks Registry v2

ERATOSTHENES – D6.7 – Workshops and Capacity building programme – 1st version

ERATOSTHENES – D6.6 – Plan on Standardization Activities

ERATOSTHENES – D6.5 – Plan on Contribution to IoT Cyber Security Certification Activities

ERATOSTHENES – D5.6 – Interim Report of Piloting Activities and Impact Assessment

ERATOSTHENES – D5.5 – Updated System integration

ERATOSTHENES – D5.4 – Cybersecurity Exercises and Trainings

ERATOSTHENES – D5.3 – Pilot 1 – POC Evaluation

ERATOSTHENES – D4.7 – AI Threat Analysis Models and Intrusion Detection for IoT Networks

ERATOSTHENES – D4.5 – Intrusion detection for IoT-based context and networks

ERATOSTHENES – D4.4 – Federated threat analysis models for continuous risk assessment

ERATOSTHENES – D4.3 – Inter-ledger platform for Cyber-threat information sharing

ERATOSTHENES – D4.2 – Secure deployment and registration of IoT devices

ERATOSTHENES – D3.7 – Identity Recovery Mechanisms

ERATOSTHENES – D3.5 – Updated version of the Identity and Access manager

ERATOSTHENES – D3.4 – DLT-based IoT Identity Manager

ERATOSTHENES – D2.5 – Trusted Execution of TBM on IoT-Edge devices

ERATOSTHENES – D2.3 – Updated Threat Modelling Module

ERATOSTHENES – D1.4 – ERATOSTHENES Blueprint – Final Architecture-1

ERATOSTHENES – D2.8_Interoperability layer with legacy infrastructure_v1.9

ERATOSTHENES – D2.6_Automated_Recovery_Mechanism_of_Trust_Manager_and_Broker_v1.0 – FINAL

ERATOSTHENES – D2.4 – Automatic Deployment Language And Tools for Trust Agents v2.3 – FINAL

ERATOSTHENES – D2.7 – IoT Network Enrolment mechanism 

ERATOSTHENES – D2.9 – Final Version of Dynamic Trust Management and Agents 

ERATOSTHENES – D3.8 – Final Version of Decentralized Identity Management 

ERATOSTHENES – D5.10 – Final Integrated Version of ERATOSTHENES 

ERATOSTHENES – D5.11-Summary of Pilot Activities 

ERATOSTHENES – D5.12 Summary of Cybersecurity Exercises and Trainings 

ERATOSTHENES – D5.13 – Summary of Pilots Management and Social Impact Assessment v1.0 

ERATOSTHENES – D6.9 – Workshops and Capacity building programme – Final version 

ERATOSTHENES – D6.11 Final dissemination activities report 

ERATOSTHENES – D6.12 – Report on IoT Cyber Security Certification Activities

ERATOSTHENES – D6.13 – Report on Standardization Activities 

ERATOSTHENES – D7.9 – Data Management Plan – Final