Empty Banner

Threat-driven security testing
and proactive DEFense identification for EDGE-cloud systems

Deliverables

# Title Document (only for public deliverables) or link
D1 Analysis and characterization of the state of art: edge-cloud threats, attacks, MTD techniques and data
analysis methods
 
D2 Management and validation Plan - preliminary  
D3 System Modeling Tool  
D4 Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - preliminary  
D5 Knowledge bases’ schema and preliminary implementations  
D6 Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - final  
D7 Management and Validation Plan - final  
D8 SW related to implemented MTD techniques and attack techniques - preliminary  
D9 SW related to implemented MTD techniques and attack techniques - final