Deliverables

All publicly available deliverables from SPARTA, approved and reviewed by the European Commission.

Deliverables

CCN governance and assessment

  • D1.1: Bootstrapping a CCN pilot
  • D1.2: Lessons learned from internally assessing a CCN pilot
  • D1.3: Improving a CCN pilot
  • D1.4: Lessons learned from externally assessing a CCN pilot
  • D1.5: Preparing to become a sustainable CCN
  • D1.6: From assessing to supporting the future CCN

Responsible innovation: ethical, legal and societal aspects

  • D2.1: Ethical legal and societal aspects
  • D2.2: First internal ELSA audit and supervision report
  • D2.3: Key challenges and promising solution approaches
  • D2.4: Second internal ELSA audit and supervision report
  • D2.5: Concrete ELSA solutions for the SPARTA programs
  • D2.6: General guidelines for responsible cybersecurity research and innovation
  • D2.7: Final internal ELSA audit and supervision report

Roadmap design

  • D3.1: Initial SPARTA SRIA roadmap (v0.1)
  • D3.2: Updated SPARTA SRIA roadmap (v1)
  • D3.3: Updated SPARTA SRIA roadmap (v2)
  • D3.4: Updated SPARTA SRIA roadmap (v3)
  • D3.5: SPARTA SRIA lessons learned and future assessment

T-SHARK program

  • D4.1: Cybersecurity threat intelligence common data model
  • D4.4: Cybersecurity threat prediction framework
  • D4.5: Cybersecurity threat prediction legal framework
  • D4.6: Visual analytics system for cybersecurity threat analysis

CAPE program

  • D5.1: Assessment specifications and roadmap
  • D5.2: Demonstrators specifications
  • D5.3: Demonstrators prototypes
  • D5.4: Demonstrators evaluation

HAII-T program

  • D6.1: Security by design framework for the intelligent infrastructure
  • D6.2: Security enhanced OS software
  • D6.3: First release of demonstration
  • D6.4: Final release of demonstration

SAFAIR program

  • D7.1: AI systems threat analysis mechanisms and tools
  • D7.2: Preliminary description of AI systems security mechanisms and tools
  • D7.3: Validation and evaluation plan
  • D7.5: Final version of AI systems security mechanisms and tools
  • D7.6: Validation and evaluation report

Clustering platforms and ecosystem activities

  • D8.1: Initial results of the clustering platforms and ecosystems activities
  • D8.2: Intermediate results of the clustering platforms, and ecosystems activities
  • D8.3: Final results of the clustering, platforms, and ecosystems activities

Cybersecurity training and awareness

  • D9.1: Cybersecurity skills framework
  • D9.2: Curricula descriptions
  • D9.3: Training evaluation pilot
  • D9.4: Pilot of cyber training & exercise framework (Ct&eF)
  • D9.5: Workplace integration evaluation report

Sustainable exploitation and IPR

  • D10.1: Pre-existing components identification documentation
  • D10.3: Project results description documentation
  • D10.4: Sustainability and exploitation plan
  • D10.5: Sustainable exploitation documents
  • D10.6: Commercial deployment plan

Certification organization and support

  • D11.1: International and national cybersecurity certification initiatives
  • D11.2: Cybersecurity compliant development processes
  • D11.3: Cybersecurity evaluation facilities
  • D11.4: Report on liaison with national cybersecurity authorities
  • D11.5: International and national cybersecurity certification initiatives - Updates

Dissemination and communication

  • D12.1: Dissemination and communication plan, updates, and evalution
  • D12.2: Internal and external IT infrastructure and project website
  • D12.3: Updated dissemination and communication plan and evaluation (v1)
  • D12.4: Updated dissemination and communication plan and evaluation (v2)
  • D12.5: Final report on dissemination and communication plan and evaluation
  • D12.6: Closing the gender and diversity gap
  • D12.7: Outermost regions engagement

Project management

  • D13.1: Project quality plan