D2.1 | 6G Threat Analysis Report | 6 |
D2.2 | Use Cases, Requirements, ROBUST-6G Initial Architecture and Initial ROBUST-6G Dataspace | 12 |
D2.3 | Final ROBUST-6G Architecture and ROBUST-6G Dataspace | 28 |
D3.1 | Threat Assessment and Prevention Report | 11 |
D3.2 | Initial Report on ROBUST-6G Trustworthy and Sustainable AI Architecture and Requirements for Integrating Selected XAI Measures | 15 |
D3.3 | ROBUST-6G Trustworthy and Sustainable AI Prototype | 21 |
D3.4 | Final Report on ROBUST-6G Trustworthy and Sustainable AI Architecture and Requirements for Integrating Selected XAI Measures | 27 |
D4.1 | Security Automation for 6G | 10 |
D4.2 | ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Design I and Early Prototype | 15 |
D4.3 | ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Design II | 21 |
D4.4 | ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Final Prototype and Design III | 27 |
D5.1 | Library of Known PHY Attacks and PLS Dataset | 12 |
D5.2 | Report on the use of PLS in 6G | 24 |
D5.3 | Release of Physical Layer Security Challenges | 28 |
D6.1 | Use Case Validation Plan and Testbed Design | 10 |
D6.2 | Intermediate Validation Results | 21 |
D6.3 | Prototype Validation of ROBUST-6G Components | 30 |