Deliverables

All public deliverables are available here after EC confirmation.

WP1: Consortium Management
D1.1 Quality management Plan, Report, Confidential
D1.2 Activity Reports at M6, Report, Confidential
D1.3 Activity Reports at M12 WP1, Report, Confidential
D1.4 Activity Reports at M24, Report, Confidential
D1.5 Activity Reports at M36, Report, Confidential
D1.6 Management reports at M6, Report, Confidential
D1.7 Management reports at M12, Report, Confidential
D1.8 Management reports at M24, Report, Confidential
D1.9 Management reports at M36, Report, Confidential
D1.10 Data Management Plan and Reports at M6, Report, Confidential
D1.11 Data Management Plan and Reports at M12, Report, Confidential
D1.12 Data Management Plan and Reports at M24, Report, Confidential
D1.13 Data Management Plan and Reports at M36, Report, Confidential
D1.14 Administrative and financial report at M6, Report, Confidential
D1.15 Administrative and financial report at M12, Report, Confidential
D1.16 Administrative and financial report at M24, Report, Confidential
D1.17 Administrative and financial report at M36, Report, Confidential
WP2: Use Cases and Requirements Analysis
D2.1 High-impact use cases analysis, Report, Download
D2.2 Privacy requirements, Report, Download
D2.3 Visualisation requirements, Report, Download
D2.4 SAPPAN functional specification and architecture definition, Report, Confidential
D2.5 Evaluation plan, Report, Confidential
WP3: Massive Data Acquisition and Local Attack Detection
D3.1 Data selection and preparation, Report, Confidential
D3.2 Annotated data set, Type: Data sets, microdata, etc, Download
D3.3 Fast and scalable data processing algorithms for cybersecurity, Other, Confidential
D3.4 Algorithms for analysis of cybersecurity data, initial version, Other, Confidential
D3.5 Algorithms for analysis of encrypted and anonymized cybersecurity data, final version, Other, Confidential
D3.6 Cybersecurity data abstractions, initial version, Other, Confidential
D3.7 Cybersecurity data abstractions, final version, Other, Confidential
D3.8 Demonstrator of visual support for designing detection models, initial version, Demonstrator, Download
D3.9 Demonstrator of visual support for designing detection models, final version, Demonstrator, Download
WP4: Managing and Automating Threat Intelligence
D4.1 Formal methodology for modeling of response and recovery actions and their triggers, Report, Confidential
D4.2 Vocabulary for incident data and response and recovery actions, Report, Download
D4.3 Approach for capturing incident response and recovery steps, Report, Download
D4.4 Algorithm to recommend response and recovery actions to human operators, first version, Other, Download
D4.5 Algorithm to recommend response and recovery actions to human operators, final version, Other, Download
D4.6 Algorithm to automate recommended response and recovery actions without human operators, first version, Other, Download
D4.7 Algorithm to automate recommended response and recovery actions without human operators, final version, Other, Download
D4.8 Demonstrator for tracking provenance in visual analyses, first version, Demonstrator, Download
D4.9 Demonstrator for tracking provenance in visual analyses, final version, Demonstrator, Download
WP5: Sharing and Federation for Cyber Threat Detection and Response
D5.1 Global model based on shared anonymised data, first version, Report, Download
D5.2 Global model based on shared anonymised data, final version, Report, Download
D5.3 Global model based on shared local models, first version, Report, Download
D5.4 Global model based on shared local models, final version, Report, Download
D5.5 Global model without sharing local models, first version, Report, Download
D5.6 Global model without sharing local models, final version, Report, Download
D5.7 Sharing response handling information, first version, Report, Download
D5.8 Sharing response handling information, final version, Report, Download
D5.9 Demonstrator for uncertainty visualisation, Demonstrator, Download
D5.10 Demonstrator for visualisation support for distributed and federated learning, Demonstrator, Download
WP6: Integration, Validation, and Visualization
D6.1 SAPPAN dashboard, initial version, Demonstrator, Download
D6.2 SAPPAN dashboard, final version, Demonstrator, Download
D6.3 SAPPAN demonstrator, Demonstrator, Download
D6.4 Technical and operational evaluation in relevant environments, Report, Confidential
WP7: Dissemination and Exploitation
D7.1 Exploitation plan and reports at M12, Report, Download
D7.2 Exploitation plan and reports at M24, Report, Confidential
D7.3 Exploitation plan and reports at M36, Report, Confidential
D7.4 IP plan, reports and IPR issues at M12, Report, Download
D7.5 IP plan, reports and IPR issues at M24, Report, Confidential
D7.6 IP plan, reports and IPR issues at M36, Report, Confidential
D7.7 Report on Information and Presentation Materials at M12, Report, Download
D7.8 Report on Information and Presentation Materials at M24, Report, Download
D7.9 Report on Information and Presentation Materials at M36, Report, Download
D7.10 Project Website, Type: Websites, patents, filling, etc, Download
D7.11 Dissemination Plan and Reports at M3, Report, Download
D7.12 Dissemination Plan and Reports at M12, Report, Download
D7.13 Dissemination Plan and Reports at M24, Report, Download
D7.14 Dissemination Plan and Reports at M36, Report, Download