Work item | Question | Equiv. Num. | Status | Timing | Approval process | Version | Liaison relationship | Subject / Title | Priority |
TR.AISec | Q7/17 | | Under study | 2025-Q4 | Agreement | New | - | Technical Report: Artificial intelligence security standardization strategies | Medium |
TR.dpama | Q7/17 | | Under study | 2025-12 | Agreement | New | ISO/IEC JTC 1/SC 27, IEEE IEEE3079.3.2 | Technical Report on "Landscape analysis for data protection of avatars in metaverse applications" | Medium |
TR.lzkml | Q7/17 | | Under study | 2026-Q3 | Agreement | New | - | Technical Report: Landscape analysis of Zero-Knowledge machine learning | Medium |
TR.saAIoT | Q7/17 | | Under study | 2025-Q4 | Agreement | New | - | Technical Report: Security Threat Analysis for Artificial Intelligence of Things on Devices | Medium |
TR.se-ai | Q7/17 | | Under study | 2025-12 | Agreement | New | ITU-T SG13, ISO/IEC JTC 1/SC 27, ISO/IEC JTC 1/SC 42 | Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT | Medium |
X.1130 (ex X.tg-fdma) | Q7/17 | | Under study | 2025-04 | TAP | New | - | Technical guidelines for fraud detection of malicious applications in mobile devices | Medium |
X.1456 (ex X.sgdfs-us) | Q7/17 | | Determined 2024-09-06 | 2024-09 | TAP | New | None | Security guidelines for DFS applications based on USSD and STK | Medium |
X.1457 (ex X.str-irs) | Q7/17 | | Under study | 2025-04 | TAP | New | - | Security threats and requirements for information recommendation service | - |
X.2013 (ex X.smdtf) | Q7/17 | X.smdtf | Consented 2025-04-17 | 2025-04 | AAP | New | - | Security measures for digital twin federation in smart cities and communities | Medium |
X.2050 (ex X.srmpc) | Q7/17 | X.srmpc | Consented 2025-04-17 | 2025-04 | AAP | New | - | Security requirements for monitoring physical city assets | Medium |
X.AA-LLM | Q7/17 | | Under study | 2026-Q4 | AAP | New | - | Guidelines for Preventing and Mitigating Adversarial Attacks on LLMs in Metaverse and Digital Twin Environments | Medium |
X.AI-App_policy | Q7/17 | | Under study | 2026-09 | TAP | New | - | Reference architecture for AI-assisted analysis of consistency between App's data usage behaviour and its privacy policy | Medium |
X.AI-gcd | Q7/17 | | Under study | 2027-Q1 | AAP | New | - | Guidelines for Artificial Intelligence-generated content detection | Medium |
X.APIRSD | Q7/17 | | Under study | 2027-Q3 | AAP | New | - | Technical requirements for public API runtime security risk detection | Medium |
X.fr-vsasi | Q7/17 | | Under study | 2025-Q3 | AAP | New | - | Functional requirements for visualization service of network security assets and security incidents based on digital twin | - |
X.GenAI-FT | Q7/17 | | Under study | 2027-03 | AAP | New | - | Security guidelines for fine-tuning generative AI model | Medium |
X.ias | Q7/17 | | Under study | 2026-03 | AAP | New | ISO/IEC JCT1 SC27 WG2&WG5, IETF Security OAuth | Functional requirements for the integrated authentication service of telecommunication operators | - |
X.ig-dw | Q7/17 | | Under study | 2026-Q3 | TAP | New | SG16 | Implementation guidelines for digital watermarking | Medium |
X.pg-cla | Q7/17 | | Under study | 2027-Q3 | AAP | New | ITU-T SG13, ISO/IEC JTC1/SC 42, ETSI | A guideline for continual learning to actively respond to network attacks | Medium |
X.S-AIA | Q7/17 | | Under study | 2027-03 | AAP | New | - | Security requirements and guidelines for Artificial Intelligence agent | Medium |