Skip to content
Deliv. #Deliverable NameDeliv. Month
D2.1 6G Threat Analysis Report6
D2.2Use Cases, Requirements, ROBUST-6G Initial Architecture and Initial ROBUST-6G Dataspace12
D2.3Final ROBUST-6G Architecture and ROBUST-6G Dataspace28
D3.1Threat Assessment and Prevention Report11
D3.2Initial Report on ROBUST-6G Trustworthy and Sustainable AI Architecture and Requirements for Integrating Selected XAI Measures15
D3.3ROBUST-6G Trustworthy and Sustainable AI Prototype21
D3.4Final Report on ROBUST-6G Trustworthy and Sustainable AI Architecture and Requirements for Integrating Selected XAI Measures27
D4.1Security Automation for 6G10
D4.2ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Design I and Early Prototype15
D4.3ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Design II21
D4.4ROBUST-6G AI/ML Driven Zero-Touch Security Management Platform Final Prototype and Design III27
D5.1Library of Known PHY Attacks and PLS Dataset12
D5.2Report on the use of PLS in 6G24
D5.3Release of Physical Layer Security Challenges28
D6.1Use Case Validation Plan and Testbed Design10
D6.2Intermediate Validation Results21
D6.3Prototype Validation of ROBUST-6G Components30