Demonstrator Descriptions and Evaluation Report

Summary
D13.6 will describe the developed trustable wireless IVN demonstrators (D13.4 and D13.5) and additionally includes the corresponding evaluation results. The report will also include the analysis of the impact of two high impact/high risk security threats on the system behaviour and system performance.
Structured mapping
Unfold all
/
Fold all
Report
CORDA