WP9 – Dissemination, Communication, and Exploitation
Coordinated by
UTC (M01-M36)
Objective
Dissemination and Data Management
The following main targets will be addressed:
- Make sure that dissemination of results is pro-actively covered and Data Management is addressed
- Set-up and apply a dissemination strategy to spread BIECO results EU-wide
- Set-up and apply a Data Management plan for open/restricted data and publication strategy
- Plan and coordinate the participation in conferences, fairs, clustering events and inter-project harmonization, especially synchronization with other H2020 activities
Exploitation and Standardization
- Identify and implement exploitation mechanisms with the partners and other EU industries to ensure uptake and portability of BIECO results beyond the planned applications within the project
- Plan the standardization of BIECO project results
Summarize the overall BIECO outcome in an evaluation report for wide-spread communication
Communication
- Support the website and all the social media
- Communication media materials
Deliverables
- D9.1 Dissemination Strategy – Initial Version WP9 (4 – UTC) Report Public M6
- D9.2 Dissemination Strategy – Updated Version WP9 (4 – UTC) Report Public M18
- D9.3 Dissemination Strategy – Final Report WP9 (4 – UTC) Report Public M36
- D9.4 Exploitation strategy and planning including IP WP9 (4 – UTC) Report Confidential, only for members of the consortium (including the Commission Services) M18
- D9.5 Exploitation strategy and planning including IP – Final Report WP9 (4 – UTC) Report Confidential, only for members of the consortium (including the Commission Services) M36
Outcomes
Fuzzing Tool
Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.
ResilBlockly
This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.
Security tools for AI Investments platform
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
Extended MUD file
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…