{"id":788,"date":"2024-01-23T11:20:05","date_gmt":"2024-01-23T11:20:05","guid":{"rendered":"http:\/\/sites.itml.gr:9988\/?page_id=788"},"modified":"2024-01-25T15:29:29","modified_gmt":"2024-01-25T15:29:29","slug":"deliverables","status":"publish","type":"page","link":"http:\/\/sites.itml.gr:9988\/deliverables\/","title":{"rendered":"Deliverables"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″ disabled_on=”on|off|off”][et_pb_column type=”4_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.23″ _module_preset=”default” background_color=”rgba(214,214,214,0.42)” custom_margin=”||||false|false” custom_padding=”||||false|false” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n\n\n\n\n
Deliverable No.<\/b><\/td>\nDeliverable name<\/b><\/span><\/span><\/th>\nType<\/b><\/th>\nDissemination level<\/b><\/td>\n<\/tr>\n
D1.1<\/td>\nProject Management, Risk
Identification, and Quality Assurance Handbook<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D1.2<\/td>\nPrivacy Protection and Data
Management Plan<\/td>\n
Data
Management Plan (DMP)<\/td>\n
Sensitive<\/td>\n<\/tr>\n
D1.3<\/td>\nAnnual Management Report 1<\/td>\nReport<\/td>\nSensitive<\/td>\n<\/tr>\n
D1.4<\/td>\nAnnual Management Report 2<\/td>\nReport<\/td>\nSensitive<\/td>\n<\/tr>\n
D1.5<\/td>\nAnnual Management Report 3<\/td>\nReport<\/td>\nSensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n
D2.1<\/td>\nState of the art, Reference Pilot
Scenarios, Requirements, and Analysis<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D2.2<\/td>\nArchitecture and Technical
Specification of CyberSecDome<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” background_color=”rgba(214,214,214,0.42)” custom_margin=”||||false|false” custom_padding=”||||false|false” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n
D3.1<\/td>\nSpecifications of the AI-empowered
security tools<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D3.2<\/td>\nImplementation of AI-empowered
security tools<\/td>\n
Demonstrator,
pilot, prototype (DEM)<\/td>\n
Sensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n\n\n\n
D4.1<\/td>\nSpecification of the collaborative
interfaces and information sharing for the
CyberSecDome<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D4.2<\/td>\nImplementation of collaborative
interfaces and information sharing for the
CyberSecDome<\/td>\n
Demonstrator,
pilot, prototype (DEM)<\/td>\n
Sensitive<\/td>\n<\/tr>\n
D4.3<\/td>\nFirst Integrated CyberSecDome
system<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D4.4<\/td>\nSecond Integrated CyberSecDome
system<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D4.5<\/td>\nFinal Integrated CyberSecDome
System<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” background_color=”rgba(214,214,214,0.42)” custom_margin=”||||false|false” custom_padding=”||||false|false” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n\n\n\n\n
D5.1<\/td>\nImplementation Strategy and
Evaluation Plan and Benchmarks<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D5.2<\/td>\nOpen call methodology and
procedures<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D5.3<\/td>\nOpen call documentation, reports
and analytics 1<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D5.4<\/td>\nOpen call documentation, reports
and analytics 2<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D5.5<\/td>\nPilot Operations, Open call
Validation and Evaluation Report 1<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D5.6<\/td>\nPilot Operations, Open call
Validation and Evaluation Report 2<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” border_width_all=”2px” border_color_all=”#6B6B6B” global_colors_info=”{}”]<\/p>\n\n\n\n\n\n\n\n\n\n
D6.1<\/td>\nDissemination and Communication
Strategy<\/td>\n
Report<\/td>\nPublic<\/td>\n<\/tr>\n
D6.2<\/td>\nIntermediary Report on
Dissemination and Communication
Activities<\/td>\n
Report<\/td>\nPublic<\/td>\n<\/tr>\n
D6.3<\/td>\nFinal Report on Dissemination and
Communication Activities<\/td>\n
Report<\/td>\nPublic<\/td>\n<\/tr>\n
D6.4<\/td>\nIntermidiary Report on Contribution
to Certification Standardisation<\/td>\n
Report<\/td>\nPublic<\/td>\n<\/tr>\n
D6.5<\/td>\nFinal Report on Contribution to
Certification Standardisation<\/td>\n
Report<\/td>\nPublic<\/td>\n<\/tr>\n
D6.6<\/td>\nIntermidiary Exploitation,
Sustainability, and Business Plans<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n
D6.7<\/td>\nFinal Exploitation, Sustainability,
and Business Plans<\/td>\n
Report<\/td>\nSensitive<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ disabled_on=”off|on|on”][et_pb_column _builder_version=”4.23″ _module_preset=”default” type=”4_4″ hover_enabled=”0″ sticky_enabled=”0″][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]D1.1 – Project Management, Risk Identification, and Quality Assurance Handbook (Report – Sensitive)
\nD1.2 – Privacy Protection and Data Management Plan ( Data Management Plan [DMP] – Sensitive)
\nD1.3 – Annual Management Report 1 (Report Sensitive)
\nD1.4 – Annual Management Report 2 (Report Sensitive)
\nD1.5 – Annual Management Report 3 (Report Sensitive)[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]D2.1 – State of the art, Reference Pilot Scenarios, Requirements, and Analysis\t(Report Sensitive)
\nD2.2 – Architecture and Technical Specification of CyberSecDome (Report\tSensitive)[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]D3.1 – Specifications of the AI-empowered security tools\t(Report, Sensitive)
\nD3.2 – Implementation of AI-empowered security tools (Demonstrator pilot, prototype [DEM], Sensitive)[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]D4.1 – Specification of the collaborative interfaces and information sharing for the CyberSecDome (Report, Sensitive)
\nD4.2 – Implementation of collaborative interfaces and information sharing for the CyberSecDome (Demonstrator pilot, prototype [DEM], Sensitive)
\nD4.3 – First Integrated CyberSecDome system (Report, Sensitive)
\nD4.4 – Second Integrated CyberSecDome system (Report, Sensitive)
\nD4.5 – Final Integrated CyberSecDome System (Report, Sensitive)[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]D5.1 – Implementation Strategy and Evaluation Plan and Benchmarks (Report, Sensitive)
\nD5.2 – Open call methodology and procedures (Report, Sensitive)
\nD5.3 – Open call documentation, reports and analytics 1 (Report, Sensitive)
\nD5.4 – Open call documentation, reports and analytics 2\t(Report, Sensitive)
\nD5.5 – Pilot Operations, Open Call Validation and Evaluation Report 1\t(Report, Sensitive)
\nD5.6 – Pilot Operations, Open Call Validation and Evaluation Report 2\t(Report, Sensitive)[\/et_pb_text][et_pb_text _builder_version=”4.23″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ border_width_all=”2px”]<\/p>\n

D6.1 – Dissemination and Communication Strategy (Report, Public)
D6.2 – Intermediary Report on Dissemination and Communication Activities (Report, Public)
D6.3 – Final Report on Dissemination and Communication Activities (Report, Public)
D6.4 – Intermidiary Report on Contribution to Certification Standardisation (Report, Public)
D6.5 – Final Report on Contribution to Certification Standardisation (Report, Public)
D6.6 – Intermidiary Exploitation, Sustainability, and Business Plans (Report, Sensitive)
D6.7 – Final Exploitation, Sustainability, and Business Plans (Report, Sensitive)<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Deliverable No. Deliverable name Type Dissemination level D1.1 Project Management, RiskIdentification, and Quality Assurance Handbook Report Sensitive D1.2 Privacy Protection and DataManagement Plan DataManagement Plan (DMP) Sensitive D1.3 Annual Management Report 1 Report Sensitive D1.4 Annual Management Report 2 Report Sensitive D1.5 Annual Management Report 3 Report Sensitive D2.1 State of the art, Reference PilotScenarios, […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-788","page","type-page","status-publish","hentry"],"yoast_head":"\nDeliverables - CyberSecDome<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/sites.itml.gr:9988\/deliverables\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deliverables - CyberSecDome\" \/>\n<meta property=\"og:description\" content=\"The 1st plenary meeting of the CyberSecDome project took place successfully on the 30th\u20131st of December 2023! The meeting was hosted by the project\u2019s coordinator, maggioli, in Athens, Greece. Representatives from 15 organizations of the project consortium from 10 European countries joined the meeting physically, while some of the partners were able to participate and […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/sites.itml.gr:9988\/deliverables\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecDome\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-25T15:29:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/sites.itml.gr:9988\/deliverables\/\",\"url\":\"http:\/\/sites.itml.gr:9988\/deliverables\/\",\"name\":\"Deliverables - CyberSecDome\",\"isPartOf\":{\"@id\":\"http:\/\/sites.itml.gr:9988\/#website\"},\"datePublished\":\"2024-01-23T11:20:05+00:00\",\"dateModified\":\"2024-01-25T15:29:29+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/sites.itml.gr:9988\/deliverables\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/sites.itml.gr:9988\/deliverables\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/sites.itml.gr:9988\/deliverables\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/sites.itml.gr:9988\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deliverables\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/sites.itml.gr:9988\/#website\",\"url\":\"http:\/\/sites.itml.gr:9988\/\",\"name\":\"CyberSecDome\",\"description\":\"EU Funding\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/sites.itml.gr:9988\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deliverables - CyberSecDome","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/sites.itml.gr:9988\/deliverables\/","og_locale":"en_US","og_type":"article","og_title":"Deliverables - CyberSecDome","og_description":"The 1st plenary meeting of the CyberSecDome project took place successfully on the 30th\u20131st of December 2023! The meeting was hosted by the project\u2019s coordinator, maggioli, in Athens, Greece. Representatives from 15 organizations of the project consortium from 10 European countries joined the meeting physically, while some of the partners were able to participate and […]","og_url":"http:\/\/sites.itml.gr:9988\/deliverables\/","og_site_name":"CyberSecDome","article_modified_time":"2024-01-25T15:29:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/sites.itml.gr:9988\/deliverables\/","url":"http:\/\/sites.itml.gr:9988\/deliverables\/","name":"Deliverables - CyberSecDome","isPartOf":{"@id":"http:\/\/sites.itml.gr:9988\/#website"},"datePublished":"2024-01-23T11:20:05+00:00","dateModified":"2024-01-25T15:29:29+00:00","breadcrumb":{"@id":"http:\/\/sites.itml.gr:9988\/deliverables\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/sites.itml.gr:9988\/deliverables\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/sites.itml.gr:9988\/deliverables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/sites.itml.gr:9988\/"},{"@type":"ListItem","position":2,"name":"Deliverables"}]},{"@type":"WebSite","@id":"http:\/\/sites.itml.gr:9988\/#website","url":"http:\/\/sites.itml.gr:9988\/","name":"CyberSecDome","description":"EU Funding","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/sites.itml.gr:9988\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/pages\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":20,"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/pages\/788\/revisions"}],"predecessor-version":[{"id":912,"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/pages\/788\/revisions\/912"}],"wp:attachment":[{"href":"http:\/\/sites.itml.gr:9988\/wp-json\/wp\/v2\/media?parent=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}