| # | Title | Document (only for public deliverables) or link |
|---|---|---|
| D1 | Analysis and characterization of the state of art: edge-cloud threats, attacks, MTD techniques and data analysis methods |
|
| D2 | Management and validation Plan - preliminary | |
| D3 | System Modeling Tool | |
| D4 | Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - preliminary | |
| D5 | Knowledge bases’ schema and preliminary implementations | |
| D6 | Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - final | |
| D7 | Management and Validation Plan - final | |
| D8 | SW related to implemented MTD techniques and attack techniques - preliminary | |
| D9 | SW related to implemented MTD techniques and attack techniques - final |




