WP 1 | Management and Coordination | D1.1 | Kick-off Meeting | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 1 | Management and Coordination | D1.2 | Management Report | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 1 | Management and Coordination | D1.3 | First Year Progress Report | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 1 | Management and Coordination | D1.4 | Third Year Progress Report | ![](data:image/jpeg;base64,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) |
WP 1 | Management and Coordination | D1.5 | Data Management Plan | ![](data:image/jpeg;base64,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) |
WP 2 | Requirements and System Architecture | D2.1 | System Requirements and Software Architecture (a) | ![](https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcTmHKbL6tlcuczGYOGaxyPNdfVR6RGJQnZe5-xksACwBdoWh63JAg ) |
WP 2 | Requirements and System Architecture | D2.2 | System Requirements and Software Architecture (b) | ![](https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcTmHKbL6tlcuczGYOGaxyPNdfVR6RGJQnZe5-xksACwBdoWh63JAg ) |
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.1 | Report on user and societal Aspects, and on Usability of Security and Privacy OSN Systems | ![](https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcTmHKbL6tlcuczGYOGaxyPNdfVR6RGJQnZe5-xksACwBdoWh63JAg ) |
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.2 | Development of Accurate and Sophisticated Sentiment Analysis Approaches | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.3 | Security- and Privacy-Driven User Interface Design Guidelines | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.1 | Development of Automated Techniques to Detect Early Indications of Malicious Behavior of Social Network Users | ![](https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcTmHKbL6tlcuczGYOGaxyPNdfVR6RGJQnZe5-xksACwBdoWh63JAg ) |
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.2 | Software Libraries Built on Graphos.ml Using Data Mining for the Detection of Aggressive or Distressed Behaviors in OSNs | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.3 | Implementation of Browser add-on that Detects Distressed or Aggressively Behaving Users | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 5 | Fake Activity Detection and Suppression | D5.1 | Software Libraries Built on Graphos.ml for Detection of Fake Activity in Large Scale OSNs | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 5 | Fake Activity Detection and Suppression | D5.2 | Implementation of Browser add-on that Detects False Information and Fake Identities in OSN | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 6 | Sensitive Content Detection and Protection | D6.1 | Design and Implementation of in-browser Content Analysis Filter | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 6 | Sensitive Content Detection and Protection | D6.2 | Development of Content Protection Techniques that Use Steganography, Encryption and Watermarking | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 6 | Sensitive Content Detection and Protection | D6.3 | Implementation of Browser add-on for Content Detection and Protection | ![](https://encase.socialcomputing.eu/wp-content/uploads/2019/04/images.jpeg)
|
WP 7 | Pilots and Validation | D7.1 | Initial Testing and Evaluation | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 7 | Pilots and Validation | D7.2 | Software Modules Integration | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 7 | Pilots and Validation | D7.3 | Pilots and Testing Results. | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 8 | Exploitation and Dissemination | D8.1 | Dissemination, Commercialization and IP Protection Plan | ![](data:image/jpeg;base64,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) |
WP 8 | Exploitation and Dissemination | D8.2 | Dissemination, Commercialization and IP Protection Activities (a) | ![](https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcTmHKbL6tlcuczGYOGaxyPNdfVR6RGJQnZe5-xksACwBdoWh63JAg ) |
WP 8 | Exploitation and Dissemination | D8.3 | Dissemination, Commercialization and IP Protection Activities (b) | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 8 | Exploitation and Dissemination | D8.4 | Market Analysis and Exploitation Plan | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 9 | | D9.1 | POPD - Requirement No. 2 | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |
WP 9 | | D9.2 | H - Requirement No. 4 | ![](/wp-content/uploads/2018/01/confidencial.jpeg) |