eratosthenis l14a

Deliverables

Public Deliverables

The list of public deliverables of ERATOSTHENES has been included below.

ERATOSTHENES – D1.1 – Research Agenda, IoT threat landscape and sec challenges

ERATOSTHENES – D1.3 – Preliminary ERATOSTHENES Architecture

ERATOSTHENES – D2.1 Trust Broker Mechanism

ERATOSTHENES – D3.3 – Design of Physical Unclonable Functions for IdM

ERATOSTHENES – D5.1 – First System Integration and Proof of Concept

ERATOSTHENES – D6.1 – Project website, social network, visual identity

ERATOSTHENESD6.2 – Dissemination and Communication Plan

ERATOSTHENES – D7.1 Project Management Handbook

ERATOSTHENES – D7.2 – Quality Plan and Risks Registry V1

ERATOSTHENES – D7.3 – Data Management Plan V1

ERATOSTHENES – D8.1 – H – Requirement No1 

ERATOSTHENES – D8.2 – H.Requirement No2 – FINAL

ERATOSTHENES – D8.4- NEC – Requirement No. 5 v4

ERATOSTHENES – D6.3 – Capacity Building Programme and Planning – FINAL

ERATOSTHENES – D3.1- Prototype of Context-aware identity and access manager – FINAL

ERATOSTHENES – D3.2 – Prototype_of_Advanced_Data_Protection_Mechanism_v1.0 – FINAL 

ERATOSTHENES – D7.7 – Quality Plan and Risks Registry v2

ERATOSTHENES – D6.7 – Workshops and Capacity building programme – 1st version

ERATOSTHENES – D6.6 – Plan on Standardization Activities

ERATOSTHENES – D6.5 – Plan on Contribution to IoT Cyber Security Certification Activities

ERATOSTHENES – D5.6 – Interim Report of Piloting Activities and Impact Assessment

ERATOSTHENES – D5.5 – Updated System integration

ERATOSTHENES – D5.4 – Cybersecurity Exercises and Trainings

ERATOSTHENES – D5.3 – Pilot 1 – POC Evaluation

ERATOSTHENES – D4.7 – AI Threat Analysis Models and Intrusion Detection for IoT Networks

ERATOSTHENES – D4.5 – Intrusion detection for IoT-based context and networks

ERATOSTHENES – D4.4 – Federated threat analysis models for continuous risk assessment

ERATOSTHENES – D4.3 – Inter-ledger platform for Cyber-threat information sharing

ERATOSTHENES – D4.2 – Secure deployment and registration of IoT devices

ERATOSTHENES – D3.7 – Identity Recovery Mechanisms

ERATOSTHENES – D3.5 – Updated version of the Identity and Access manager

ERATOSTHENES – D3.4 – DLT-based IoT Identity Manager

ERATOSTHENES – D2.5 – Trusted Execution of TBM on IoT-Edge devices

ERATOSTHENES – D2.3 – Updated Threat Modelling Module

ERATOSTHENES – D1.4 – ERATOSTHENES Blueprint – Final Architecture-1

ERATOSTHENES – D2.8_Interoperability layer with legacy infrastructure_v1.9

ERATOSTHENES – D2.6_Automated_Recovery_Mechanism_of_Trust_Manager_and_Broker_v1.0 – FINAL

ERATOSTHENES – D2.4 – Automatic Deployment Language And Tools for Trust Agents v2.3 – FINAL