BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UNITY-6G - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:UNITY-6G
X-ORIGINAL-URL:https://unity-6g.eu
X-WR-CALDESC:Events for UNITY-6G
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20250804T010000
DTEND;TZID=Europe/Paris:20250805T005959
DTSTAMP:20260429T162710
CREATED:20250618T045929Z
LAST-MODIFIED:20250618T045931Z
UID:157342-1754269200-1754355599@unity-6g.eu
SUMMARY:IEEE CSR 2025 - Tutorials
DESCRIPTION:Tutorial abstract \n\n\n\nApplying data engineering and blockchain for B5G/6G networks: A step-by-step approach \n\n\n\nProf. Madhusanka Liyanage\, University College Dublin (IE)Dr. Engin Zeydan\, Centre Tecnologic de Telecomunicacions de Catalunya (ES)\n\n\n\n\n\n\n\nTutorial abstract\n\n\n\nIn this tutorial\, we aim to provide a comprehensive and thorough overview of the recent advances in data engineering and blockchain frameworks and link the capabilities of these ecosystems to future telecommunication systems. Some special features of this tutorial are: a clear link between the data engineering (including data connection\, data ingestion\, data processing & analysis\, data storage\, data monitoring & visualisation and data management & orchestration frameworks) ecosystem with telecommunication networks and role of blockchain for B5G\, an overview of applications of DLT/blockchain enabled B5G system and how these can be related to data engineering frameworks\, the relationship to data science frameworks\, and related data engineering and blockchain use cases for telecommunications networks will be discussed. Two example demonstrations will also be demonstrated. \n\n\n\nThe tutorial will cover an in-depth study of convergence of data engineering and blockchain for B5G/6G networks. The first part will be background information on data engineering and blockchain and the second part will be on the application of those technologies to B5G/6G use cases. In the second part\, there will be a step-by-step demonstration of one of the demos during the second part of the tutorial. The participants do not need to have any prerequisite components. Application of data engineering and blockchain concepts in the application of telecommunication networks is an emerging topic and will be most important in the coming years as well. The attendees to this tutorial will have the chance to learn more about data engineering and blockchain for networking and its applications from the perspective of telecommunication operators. \n\n\n\nWeb3: Securing advanced communication networks\, the Internet and digital platforms\n\n\n\nProf. Alessandro Vizzarri\, University of Rome Tor Vergata (IT)\n\n\n\n\n\n\n\nTutorial abstract\n\n\n\nFuture Internet cybersecurity and associated services for end users might be completely transformed by the Web3 paradigm. Smart contracts\, tokens\, and blockchain are the foundation of this paradigm shift. The influence also extends to the upcoming underlying communication networks\, such as Advanced 5G and 6G. According to the most significant security authorities (such as NIST\, ENISA\, etc.)\, the keynote address will outline the essential Web3 characteristics and their implications for the security of the next platforms\, data\, and communication networks BY5G and 6G. Along with its privacy and security problems\, the enabling applications—such as Decentralised Autonomous Organisations (DAO)\, Non-Fungible Tokens (NFT)\, and Decentralised Apps (dAPP)—will also be examined. The security issues managed by web3-based technologies are also evidenced\, together with their integration with goal-oriented semantic network approach and AI/ML techniques. Finally\, the Web3 Open topics and challenges will be the subject of conclusions. \n\n\n\nMobile forensics fundamentals\n\n\n\nSoraya Marlene Harding\, University of Portsmouth (UK)\n\n\n\n\n\n\n\nTutorial abstract\n\n\n\nThis tutorial offers a comprehensive\, hands-on introduction to mobile forensics through the use of XAMN\, a powerful analytical tool designed to visualise and interpret data acquired from mobile devices. As mobile technology becomes increasingly central to modern life\, mobile devices are now critical sources of digital evidence in both criminal and civil investigations. This tutorial aims to equip participants with the foundational skills required to navigate the complex landscape of mobile forensic analysis. \n\n\n\nThroughout the session\, participants will explore the core capabilities of XAMN\, including the ability to view\, search\, filter\, and correlate large volumes of data acquired from smartphones\, tablets\, and other mobile platforms. By working through realistic forensic scenarios\, participants will practice identifying key mobile device identifiers such as IMEI (International Mobile Equipment Identity)\, IMSI (International Mobile Subscriber Identity)\, and MAC (Media Access Control) addresses—essential elements in tracing device activity and user identity. Participants will also learn how to apply various filters and search parameters within XAMN to pinpoint specific artefacts\, such as messages\, call logs\, media files\, app usage\, and location data. These skills are crucial for narrowing down large datasets to uncover relevant evidence efficiently. Additionally\, the tutorial reinforces best practices for handling digital evidence\, maintaining data integrity\, and ensuring that findings are presented in a forensically sound and legally defensible manner. \n\n\n\nBy the end of this tutorial\, participants will not only be familiar with the XAMN interface and functionality but also understand how mobile forensic tools can support broader investigative goals across various legal and security contexts. \n\n\n\nDetailed Program\n\n\n\nThe tutorial sessions have been scheduled for Monday\, 04 Aug. 2025; see also the IEEE CSR 2025 event’s program overview. \n\n\n\n\n\n\n\n08:40–10:00Session TUT1: IEEE CSR tutorialsRoom: Hall 408:40–10:00Applying data engineering and blockchain for B5G/6G networks: A step-by-step approachM. Liyanage and E. Zeydan10:00–10:20Coffee break10:20–12:00Session TUT2: IEEE CSR tutorialsRoom: Hall 410:20–12:00Applying data engineering and blockchain for B5G/6G networks: A step-by-step approachM. Liyanage and E. Zeydan12:40–13:40Lunch breakLocation: Elia restaurant13:40–15:00Session TUT3: IEEE CSR tutorialsRoom: Hall 413:40–15:00Web3: Securing advanced communication networks\, the Internet and digital platformsA. Vizzarri15:00–15:20Coffee break15:20–17:00Session TUT4: IEEE CSR tutorialsRoom: Hall 415:20–17:00Mobile forensics fundamentalsS. Harding\n\n\n\nThe tutorial will cover an in-depth study of convergence of data engineering and blockchain for B5G/6G networks. The first part will be background information on data engineering and blockchain and the second part will be on the application of those technologies to B5G/6G use cases. In the second part\, there will be a step-by-step demonstration of one of the demos during the second part of the tutorial. The participants do not need to have any prerequisite components. Application of data engineering and blockchain concepts in the application of telecommunication networks is an emerging topic and will be most important in the coming years as well. The attendees to this tutorial will have the chance to learn more about data engineering and blockchain for networking and its applications from the perspective of telecommunication operators.
URL:https://unity-6g.eu/event/ieee-csr-2025-tutorials/
ATTACH;FMTTYPE=image/jpeg:https://unity-6g.eu/wp-content/uploads/2025/06/cyber1.jpg
END:VEVENT
END:VCALENDAR