M1 to M12
T1.1. The critical role of security and resilience for collaborative manufacturing environments.
T1.2. Identifying security threats and adapting security components to real-life industrial manufacturing environments.
T1.3. Technology convergence – architecture revision and tools specifications.
T1.4. Experimentation protocol – real life industrial pilots.
T1.5. Ensured conformance to ethics requirements.
M6 to M30
T4.1. Security and trustworthiness at the edge.
T4.2. Remote Attestation and Secure C&C execution on IIoT Devices.
T4.3. Threat Detection and Mitigation.
M1 to M36
T7.1. Market definition and analysis.
T7.2. Dissemination plan and communication activities.
T7.3. Exploitation activities.
T7.4. Standardisation activities and best practices.
T7.5. Long-term sustainability and commercialisation.
T2.1. Tools and methods for secure data sharing.
T2.2. Trustworthiness of data flows.
T2.3. Machine learning-based cognitive security framework.
T2.4. Statistical Analytics and Machine- / Deep-Learning on shared data.
T2.5. Distributed anomaly detection for Industrial IoT.
T2.6. Workflow-driven security for supply chain and compliance in manufacturing.
M8 to M36
T5.1. Assurance, privacy and accountability in all Industrial IoT processes.
T5.2. Advanced informative forensics mechanisms and interactive visualisations.
T5.3. Continuous integration towards the realisation of COLLABS framework.
T5.4. From the prototype to the final solution.
T3.1. Comprehensive Access control.
T3.2. Blockchain and smart contracts.
T3.3. PKI mechanism.
T3.4 Confidential data discovery
M10 to M36
T6.1. Experimentation protocol alignment.
T6.2. Framework deployment and execution of real-life industrial demonstrations.
T6.3. Evaluation and impact analysis.
T8.1. Project quality planning.
T8.2. Day-to-day management, project & financial control and resource monitoring.
T8.3. Innovation Management.