Empty Banner

Threat-driven security testing
and proactive DEFense identification for EDGE-cloud systems

WP6 - Case studies, implementation and validation

WP6 is devoted to dissemination and validation activiteis.

  • T6.1 Validation plan and identification of the activities (M1-M6): validation plan set-up, identification of three case studies and definition of the criteria by which specific techniques for attack and defense will be selected for implementation within the case studies
  • T6.2 Implementation (M6-M18): implementation of selected attack and defense techniques for the case studies, set-up of experimental testbeds, including case-study software installations, monitoring infrastructures and tools to emulate attacks
  • T6.3 Experiment execution and validation (M12-M24): experimental testbeds will be used to generate data under controlled conditions and to test resilience solutions