WP1: Requirements and platform design
- D1.1 – The pilots’ requirements analysis report
- D1.2 – The platform’s system requirements analysis report
- D1.3 – THREAT-ARREST platform’s initial reference architecture
WP2: Emulation Tool
- D2.1 – Emulated Components Generator Modules v1
- D2.2 – Emulated components monitoring module
- D2.3 – Interlinking of Emulated Components Modules v1
- D2.4 – Emulation tool interoperability module v1
WP3: Assurance driven CTTP models and CTTP programmes creation
- D3.1 – CTTP Models and Programmes Specification Language
- D3.2 – CTTP Models and Programmes Specification Tool
- D3.3 – Reference CTTP Models and Programmes Specifications v1
WP4: Training and Visualisation tools
- D4.1 – THREAT-ARREST Visualisation Tools v1
- D4.2 – THREAT-ARREST serious games v1
- D4.3 – Training and Visualisation tools IO mechanisms v1
- D4.4 – Real time trainee performance assessment v1
WP5: Simulation Environment
- D5.1 – Real event logs statistical profiling module and synthetic event log generator v1
- D5.2 – Simulated Components and Network Generator v1
- D5.3 – The Simulation component IO module v1
- D5.4 – Simulated components network execution module v1
WP8: Communication, Sustainability management and Standardisation
- D8.1 – The stakeholders’ engagement plan & online channels development
- D8.2 – The THREAT-ARREST dissemination plan
- D8.3 – The THREAT-ARREST market analysis, business and marketing plan v1
- D8.4 – The Stakeholders’ Engagement & Online Channels Report
- D8.5 – The THREAT-ARREST dissemination and exploitation report v1