# | Title | Document (only for public deliverables) or link |
---|---|---|
D1 | Analysis and characterization of the state of art: edge-cloud threats, attacks, MTD techniques and data analysis methods |
|
D2 | Management and validation Plan - preliminary | |
D3 | System Modeling Tool | |
D4 | Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - preliminary | |
D5 | Knowledge bases’ schema and preliminary implementations | |
D6 | Methodologies (Attack and defense strategies and techniques, ML-based attack generation) - final | |
D7 | Management and Validation Plan - final | |
D8 | SW related to implemented MTD techniques and attack techniques - preliminary | |
D9 | SW related to implemented MTD techniques and attack techniques - final |