The TECoSA Course

Tutorial and State of the Art Course in topical areas related to TECoSA

Below are descriptions of the modules to be offered in the first round of the course. Attendance is free to all TECoSA members. To register, please email stating which module(s) you wish to take.

5G Security Standardization and Cloud Security Challenges, insights from Ericsson (key areas: Security)
Format: 3-hour workshop
Location: on-line (via Teams)
Timing: Friday 29 October 2021, kl.13-16
Module led by: Ericsson: Prajwol Kumar Nakarmi ( and János Kövér (
Content: Part 1: A sneak peek into how 3GPP – the defacto standardization organization for all Gs – works in general. Then, we will describe the most important security and privacy features that were introduced in 5G, making 5G the most trustworthy mobile network generation ever. Part 2: To highlight problems and identify research opportunities: *Introduction (Threat model in cloud, ideal wanted position); *Solution with TEEs (Trusted Execution Environment) and short-term challenges; *Potential residual threats (e.g. side channel attacks, trust in HW vendors).

Fundamentals of Bayesian Inference using Probabilistic Programming (key areas: Safety)
Format: Two 3-hour seminars plus preparation and homework
Kista Campus
Thurs 10 Feb kl.9-12 CET and Thurs 17 Feb kl.9-12 CET
Module led by: KTH: David Broman (
*Basics of Bayesian inference (SMC, MCMC); *Bayes rule, probabilistic modeling; *Using probabilistic programming to solve Bayesian probabilistic problems. Given through interactive lectures, hands-on exercises and take home exercises.

Trustworthiness and Dependability in Edge-based CPS (key areas: Safety, Security, Predictability)
Format: Two half-day workshops, plus preparation and homework
Location: KTH Campus, with “join on-line” option
Timing: Thurs 24 Feb kl.9-12 CET and Thurs 3 March kl.9-12 CET
Module led by: KTH: Martin Törngren (
Content: An overview of established views and definitions; relationships between concepts; trends; “schools”. Flipped class-room sessions (with preparation + assignment); discussion; collaborative effort to create a web/wiki page with “TECoSA” key concepts

Machine Reasoning Explainability (an AAMAS tutorial) (key areas: Predictability)
Format: One 3.5-hour tutorial
Location: Online (via Teams)
Timing: Weds 9 March kl.9-12.30 CET

Module lead by: Ericsson: Kristijonas Cyras, Swarup Kumar Mohalik, Alexandros Nikou, Alessandro Previti (with support from Anusha Pradeep Mujumdar and Aneta Vulgarakis Feljan  (
Content: *Concept; *Technical Part 1(Inference-Based Explanations; SAT/SMT Analysis of Inconsistencies; Argumentation-Based Explanations); *Technical Part 2 (Explainable Planning; Symbolic RL, Explainability; Causal Approaches to Explainability); *Conclusions

Industrial, Reliable Wireless Networking – Fundamentals and Systems (key areas: Predictability)
Format: Two 1.5-hour workshops
Location: KTH Campus ,with “join on-line” option
Thurs 17 March kl.16-17.30 CET and Fri 18 March kl.16-17.30 CET
Module led by: KTH: James Gross (
Content: *Underlying principles; *Communication theory background; *Implementation principles; *Examples (iWLAN, IO-Link, 5G, 802.11be)

Datascience and Machine Learning/AI with Python (key areas: Predictability)
Format: Three 1-hour workshops plus self-study
Location: Online
Timing: Weds 30 March kl.15-16, Weds 6 April kl.15-16, and Weds 13 April kl.15-16 (all CET)
Module led by: AFRY: Puneet Kumar Sharma (
Content: Learn how to use Python for data science and machine learning purposes incl Python basics, libraries and examples.

ML Security and Privacy (key areas: Security)
Format: Two 2-hour seminars, plus individual study and homework
Location: KTH Campus
Timing: Mon 4 April kl.10-12 CET and Mon 25 April kl.10-12 CET
Module led by: KTH: György Dán ( and Raksha Ramakrishna (
Content: *Taxonomy of attacks on ML; *Adversarial attacks on classification; *ML fingerprinting and watermarking; *Definitions of privacy; *Approaches to privacy preserving learning.

Autumn 2022: Fundamentals of Security for Edge Computing (key areas: Security)
Format: Three 2-hour workshops
Location: Kista Campus, with “join on-line” option
Timing: Weds 5 Oct kl.13-15, Weds 12 Oct kl.13-15 and Weds 19 Oct kl.13-15 (all CET)
Module led by: KTH: Elena Dubrova (
Content: *Introduction to cryptography (secret and public cryptosystems, encryption and authentication basics); *Attack vectors; *Anti-tamper techniques.