The page lists 6 deliverables related to the research project "CYBER-TRUST".
title and desprition | type | last update |
---|---|---|
CYBER-TRUST end-user requirementsThis report will describe the methodology used in order to extract, categorise and prioritise the end-user requirements, and their subsequent translation into technical requirements. It will be revised on month M14 following the end-user feedback during the design phase. Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |
Legal analysis of the use of evidence materialThis deliverable will analyse the legal requirements that are applicate on the collection and processing of evidence for criminal investigations and related matters. Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |
Architecture and design specifications: initialThe deliverable illustrates the architecture and the design specifications that are selected to constitute the basis of the CYBER-TRUST platform – initial version; it consists of Part I – General architecture and Part II – Tools design specifications. Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |
CYBER-TRUST use case scenariosThe report will document the use case scenarios that will guide the development of the Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |
Threat actors’ attack strategiesThe report will provide a detailed modelling of the possible attack strategies used by threat actors of particular profiles in selected types of cyber-attacks targeting at devices, networks and CIIs. Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |
Threat sharing methods: comparative analysisThe document will conduct an evaluation of existing industry-wide vulnerability reporting Programme: H2020-EU.3.7.4. - Topic(s): DS-07-2017 |
Documents, reports | 2020-04-24 |