WP1 – Project Management
Coordinated by
UNINOVA (M01-M36)
Objective
The aim is to ensure timely and efficient project execution, according to the budget and the overall project objectives. This includes, but is not limited to:
• Coordination of the technical activities and linking together all project components
o Proactive management of project plan, scope and objectives
o Tracking of Milestones, Deliverables, Reporting towards the Commission
•The overall legal, contractual, ethical, financial and administrative management o Administration of Financial Management towards the Commission o Monitor relevant rules and regulations related to the project to be properly implemented o Handle IPR and Knowledge Management
• Maintaining communication within the project as well as with the European Commission
Deliverables
- D1.1 Reporting towards the EU WP1 (1 – UNINOVA) Report Confidential, only for members of the consortium (including the Commission Services) M18
- D1.2 Project Quality Manual WP1 (1 – UNINOVA) Report Public M4
- D1.3 Data Management Plan WP1 (1 – UNINOVA) ORDP: Open Research Data Pilot Public M6
- D1.4 Update of Data Management Plan WP1 (1 – UNINOVA) Report Public M32
- D1.5 Risk Analysis WP1 (11 – IFEVS) Report Confidential, only for members of the consortium (including the Commission Services) M18
- D1.6 Risk Analysis Final Report WP1 (11 – IFEVS) Report Confidential, only for members of the consortium (including the Commission Services) M30
- D1.7 Reporting towards the EU – Final Version WP1 (1 – UNINOVA) Report Confidential, only for members of the consortium (including the Commission Services) M36
Results
Fuzzing Tool
Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.
ResilBlockly
This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.
Security tools for AI Investments platform
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
Extended MUD file
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…