DELIVERABLES
The following content presents the AI4CTI deliverables. The full text of deliverables will become available as the project progresses.
| NUMBER | TITLE | WP | TYPE | TRL | DUE | LEADER |
|---|---|---|---|---|---|---|
| D1.1 | Design of multi-source loC collector, privacy- preserving user-generated data collector, and web crawlers and messaging channel scrapers | WP1 | Technical Report | – | M6 | ERMES |
| D1.2 | First release of data collection tools | WP1 | Software | 4 | M12 | ERMES |
| D1.3 | Second release of data collection tools and release of the Open Dataset for benchmark | WP1 | Software | 5 | M24 | ERMES |
| D1.4 | Final release of data collection tools | WP1 | Software | 6 | M36 | ERMES |
| D2.1 | Creation of graph-based Data Ocean | WP2 | Technical Report | – | M6 | POLITO |
| D2.2 | First release of graph-based Data Ocean | WP2 | Software | 4 | M12 | ERMES |
| D2.3 | Continuous integration, storage, correlation of data and design of design of query API | WP2 | Technical Report | – | M12 | ERMES |
| D2.4 | First release of tools to continuous integrate, store, correlate data and of API query layer | WP2 | Software | 5 | M24 | ERMES |
| D2.5 | Final release graph-based Data Ocean, data ingestion tools and API query layer | WP2 | Technical Report & Software | 6 | M36 | ERMES |
| D3.1 | Design of Foundation Models | WP3 | Technical Report | – | M6 | POLITO |
| D3.2 | Design of classifiers to identify malicious texts and media | WP3 | Technical Report | – | M12 | POLITO |
| D3.3 | First release of Foundation Models | WP3 | Software | 3 | M18 | ERMES |
| D3.4 | Design of detection engines for malicious messages, data leakeage and malicious social accounts | WP3 | Technical Report | – | M18 | ERMES |
| D3.5 | Update on the design of Foundation Models and detection engines | WP3 | Technical Report | – | M24 | POLITO |
| D3.6 | Release of the detection engines for malicious messages, data leakage and malicious social accounts | WP3 | Technical Report & Software | 4 | M30 | ERMES |
| D3.7 | Design of detection engines for Spear Phishing and data leakage campaigns | WP3 | Technical Report | – | M30 | ERMES |
| D3.8 | Release of the detection engines for Spear Phishing and data leakage campaigns | WP3 | Technical Report & Software | 5 | M36 | ERMES |
| D4.1 | Development of Ermes CTI Feed and Ermes Alert Generator | WP4 | Technical Report | 5 | M24 | ERMES |
| D4.2 | Release of Ermes CTI Feed and Ermes Alert Generator | WP4 | Technical Report & Software | 6 | M36 | ERMES |
ARTICLES
Understanding Topics API in the Wild: Dubious Usage and Stale Adoption
A paper published on the IEEE Transactions on Privacy journal.
The Sweet Danger of Sugar: Debunking Representation Learning for Encrypted Traffic Classification
A paper presented at ACM SIGCOMM 2025 Conference.
MILESTONES
| NUMBER | WP | DUE DATE | MEANS OF VERIFICATION |
|---|---|---|---|
| MS0 | General, WP1 | M3 |
|
| MS1 | WP1, WP2.1, WP3.1 | M6 |
|
| MS2 | WP1, WP2, WP3.2, WP3.3 | M12 |
|
| MS3 | WP3.1-WP3.6 | M18 |
|
| MS4 | WP1, WP2, WP3.2, WP3.3, WP4 | M24 |
|
| MS5 | M3.2-WP3.6 | M30 |
|
| MS6 | WP1, WP2, WP3.1, WP3.7, WP3.8, WP4 | M36 |
|
