Deliverables

WP1: Consortium Management

D1.1 Quality management Plan, Report, Confidential
D1.2 Activity Reports at M6, Report, Confidential
D1.3 Activity Reports at M12 WP1, Report, Confidential
D1.4 Activity Reports at M24, Report, Confidential
D1.5 Activity Reports at M36, Report, Confidential
D1.6 Management reports at M6, Report, Confidential
D1.7 Management reports at M12, Report, Confidential
D1.8 Management reports at M24, Report, Confidential
D1.9 Management reports at M36, Report, Confidential
D1.10 Data Management Plan and Reports at M6, Report, Confidential
D1.11 Data Management Plan and Reports at M12, Report, Confidential
D1.12 Data Management Plan and Reports at M24, Report, Confidential
D1.13 Data Management Plan and Reports at M36, Report, Confidential
D1.14 Administrative and financial report at M6, Report, Confidential
D1.15 Administrative and financial report at M12, Report, Confidential
D1.16 Administrative and financial report at M24, Report, Confidential
D1.17 Administrative and financial report at M36, Report, Confidential

WP2: Use Cases and Requirements Analysis

D2.1 High-impact use cases analysis, Report, Public, Download
D2.2 Privacy requirements, Report, Public, Download
D2.3 Visualisation requirements, Report, Public, Download
D2.4 SAPPAN functional specification and architecture definition, Report, Confidential
D2.5 Evaluation plan, Report, Confidential

WP3: Massive Data Acquisition and Local Attack Detection

D3.1 Data selection and preparation, Report, Confidential
D3.2 Annotated data set, Type: Data sets, microdata, etc, Confidentiality level: Public Download
D3.3 Fast and scalable data processing algorithms for cybersecurity, Other, Confidential
D3.4 Algorithms for analysis of cybersecurity data, initial version, Other, Confidential
D3.5 Algorithms for analysis of encrypted and anonymized cybersecurity data, final version, Other, Confidential
D3.6 Cybersecurity data abstractions, initial version, Other, Confidential
D3.7 Cybersecurity data abstractions, final version, Other, Confidential
D3.8 Demonstrator of visual support for designing detection models, initial version, Demonstrator, Public
D3.9 Demonstrator of visual support for designing detection models, final version, Demonstrator, Public

WP4: Managing and Automating Threat Intelligence

D4.1 Formal methodology for modeling of response and recovery actions and their triggers, Report, Confidential
D4.2 Vocabulary for incident data and response and recovery actions, Report, Public
D4.3 Approach for capturing incident response and recovery steps, Report, Public, Download
D4.4 Algorithm to recommend response and recovery actions to human operators, first version, Other, Public, Download
D4.5 Algorithm to recommend response and recovery actions to human operators, final version, Other, Public
D4.6 Algorithm to automate recommended response and recovery actions without human operators, first version, Other, Public, Download
D4.7 Algorithm to automate recommended response and recovery actions without human operators, final version, Other, Public
D4.8 Demonstrator for tracking provenance in visual analyses, first version, Demonstrator, Public
D4.9 Demonstrator for tracking provenance in visual analyses, final version, Demonstrator, Public

WP5: Sharing and Federation for Cyber Threat Detection and Response

D5.1 Global model based on shared anonymised data, first version, Report, Public
D5.2 Global model based on shared anonymised data, final version, Report, Public
D5.3 Global model based on shared local models, first version, Report, Public
D5.4 Global model based on shared local models, final version, Report, Public
D5.5 Global model without sharing local models, first version, Report, Public
D5.6 Global model without sharing local models, final version, Report, Public
D5.7 Sharing response handling information, first version, Report, Public
D5.8 Sharing response handling information, final version, Report, Public
D5.9 Demonstrator for uncertainty visualisation, Demonstrator, Public
D5.10 Demonstrator for visualisation support for distributed and federated learning, Demonstrator, Public

WP6: Integration, Validation, and Visualization

D6.1 SAPPAN dashboard, initial version, Demonstrator, Public
D6.2 SAPPAN dashboard, final version, Demonstrator, Public
D6.3 SAPPAN demonstrator, Demonstrator, Public
D6.4 Technical and operational evaluation in relevant environments, Report, Public

WP7: Dissemination and Exploitation

D7.1 Exploitation plan and reports at M12, Report, Public, Download
D7.2 Exploitation plan and reports at M24, Report, Public
D7.3 Exploitation plan and reports at M36, Report, Public
D7.4 IP plan, reports and IPR issues at M12, Report, Public, Download
D7.5 IP plan, reports and IPR issues at M24, Report, Public
D7.6 IP plan, reports and IPR issues at M36, Report, Public
D7.7 Report on Information and Presentation Materials at M12, Report, Public, Download
D7.8 Report on Information and Presentation Materials at M24, Report, Public
D7.9 Report on Information and Presentation Materials at M36, Report, Public
D7.10 Project Website, Type: Websites, patents, filling, etc, Confidentiality level: Public, Download
D7.11 Dissemination Plan and Reports at M3, Report, Public, Download
D7.12 Dissemination Plan and Reports at M12, Report, Public, Download
D7.13 Dissemination Plan and Reports at M24, Report, Public
D7.14 Dissemination Plan and Reports at M36, Report, Public