WP 1 | Management and Coordination | D1.1 | Kick-off Meeting | |
WP 1 | Management and Coordination | D1.2 | Management Report | |
WP 1 | Management and Coordination | D1.3 | First Year Progress Report | |
WP 1 | Management and Coordination | D1.4 | Third Year Progress Report | |
WP 1 | Management and Coordination | D1.5 | Data Management Plan | |
WP 2 | Requirements and System Architecture | D2.1 | System Requirements and Software Architecture (a) | |
WP 2 | Requirements and System Architecture | D2.2 | System Requirements and Software Architecture (b) | |
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.1 | Report on user and societal Aspects, and on Usability of Security and Privacy OSN Systems | |
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.2 | Development of Accurate and Sophisticated Sentiment Analysis Approaches |
|
WP 3 | Human and Societal Aspects of Security and Privacy in the Social Web | D3.3 | Security- and Privacy-Driven User Interface Design Guidelines | |
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.1 | Development of Automated Techniques to Detect Early Indications of Malicious Behavior of Social Network Users | |
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.2 | Software Libraries Built on Graphos.ml Using Data Mining for the Detection of Aggressive or Distressed Behaviors in OSNs |
|
WP 4 | User Profiling for Detection and Prediction of Malicious Online Behavior | D4.3 | Implementation of Browser add-on that Detects Distressed or Aggressively Behaving Users |
|
WP 5 | Fake Activity Detection and Suppression | D5.1 | Software Libraries Built on Graphos.ml for Detection of Fake Activity in Large Scale OSNs |
|
WP 5 | Fake Activity Detection and Suppression | D5.2 | Implementation of Browser add-on that Detects False Information and Fake Identities in OSN |
|
WP 6 | Sensitive Content Detection and Protection | D6.1 | Design and Implementation of in-browser Content Analysis Filter |
|
WP 6 | Sensitive Content Detection and Protection | D6.2 | Development of Content Protection Techniques that Use Steganography, Encryption and Watermarking |
|
WP 6 | Sensitive Content Detection and Protection | D6.3 | Implementation of Browser add-on for Content Detection and Protection |
|
WP 7 | Pilots and Validation | D7.1 | Initial Testing and Evaluation | |
WP 7 | Pilots and Validation | D7.2 | Software Modules Integration | |
WP 7 | Pilots and Validation | D7.3 | Pilots and Testing Results. | |
WP 8 | Exploitation and Dissemination | D8.1 | Dissemination, Commercialization and IP Protection Plan | |
WP 8 | Exploitation and Dissemination | D8.2 | Dissemination, Commercialization and IP Protection Activities (a) | |
WP 8 | Exploitation and Dissemination | D8.3 | Dissemination, Commercialization and IP Protection Activities (b) | |
WP 8 | Exploitation and Dissemination | D8.4 | Market Analysis and Exploitation Plan | |
WP 9 | | D9.1 | POPD - Requirement No. 2 | |
WP 9 | | D9.2 | H - Requirement No. 4 | |