WP9 – Dissemination, Communication, and Exploitation
Coordinated by
UTC (M01-M36)
Objective
Dissemination and Data Management
The following main targets will be addressed:
- Make sure that dissemination of results is pro-actively covered and Data Management is addressed
- Set-up and apply a dissemination strategy to spread BIECO results EU-wide
- Set-up and apply a Data Management plan for open/restricted data and publication strategy
- Plan and coordinate the participation in conferences, fairs, clustering events and inter-project harmonization, especially synchronization with other H2020 activities
Exploitation and Standardization
- Identify and implement exploitation mechanisms with the partners and other EU industries to ensure uptake and portability of BIECO results beyond the planned applications within the project
- Plan the standardization of BIECO project results
Summarize the overall BIECO outcome in an evaluation report for wide-spread communication
Communication
- Support the website and all the social media
- Communication media materials
Deliverables
- D9.1 Dissemination Strategy – Initial Version WP9 (4 – UTC) Report Public M6
- D9.2 Dissemination Strategy – Updated Version WP9 (4 – UTC) Report Public M18
- D9.3 Dissemination Strategy – Final Report WP9 (4 – UTC) Report Public M36
- D9.4 Exploitation strategy and planning including IP WP9 (4 – UTC) Report Confidential, only for members of the consortium (including the Commission Services) M18
- D9.5 Exploitation strategy and planning including IP – Final Report WP9 (4 – UTC) Report Confidential, only for members of the consortium (including the Commission Services) M36
Outcomes
Defining the behavior of IoT devices through the MUD standard: review, challenges and research directions
Authors: José L. Hernández Ramos, Sara N. Matheu, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal Bernabe, Poonam Yadav, Antonio Skarmeta and Paolo Bellavista
BIECO Workshop – 2nd Day
M12 Workshop - day twoAgenda - Second day (08.09.2021) 09:00 – 09:05 Meeting Opening Review previous day agreements UNI/HS09:05 – 09:35 Video presentation - UTC09:35 – 11:00 BIECO Platform demo Common Platform Discussion: Design and Runtime Phase Tools’ Interaction...
The Challenges of Software Cybersecurity Certification
Authors: José L. Hernández-Ramos, Sara N. Matheu and Antonio Skarmeta
Basic aspects in redundancy-based intrusion tolerance
Authors: Felicita Di Giandomenico, Giulio Masetti (both ISTI-CNR Pisa)
A Survey on the State of the Art of Vulnerability Assessment Techniques
Authors: Eva Sotos Martínez, Nora M. Villanueva ,Lilian Adkinson Orellana
Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture
Authors: Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica