DESSERT’2025

15th International Conference
Dependable Systems, Services and Technologies
Greece, Athens, December 19-21, 2025
hybrid mode (i.e., using remote audio/video support
and as an in-person event)

IEEE
  • Conference Programme


  • Conference Programme is available here.

  • Important Dates

    Workshop proposal submission: October 10, 2025

    Notification of Workshop proposal acceptance: October 12, 2025

    Paper submission: November 3, 2025 November 17, 2025

    Notification of paper acceptance: November 21, 2025 November 28, 2025

    Final manuscript: November 28, 2025 December 1, 2025

    Registration and payment: November 30, 2025 December 2, 2025

    Program draft publication: December 1, 2025 December 4, 2025

    Conference date: December 19-21, 2025

  • Contacts

    Department 503, DESSERT’2025 Organizing Committee,
    National Aerospace University “KhAI”,
    Vadym Manko str., 17, Kharkiv, 61070, Ukraine
    Olena Surynovych
    Phone: +38 (066) 5389293,
    +38 (096) 1305556
    e-mail: dessert@csn.khai.edu

    www: dessert-conf.org

  • Archive

  • DESSERT'2022

    DESSERT'2023

    DESSERT'2024

Home

Welcome to DESSERT’2025

The 15th International Conference on
Dependable Systems, Services and Technologies (DESSERT’2025)

2025 Theme:
Trustworthy and Resilient AI Systems for a Safe and Secure World

Greece, Athens
December 19-21, 2025

Organizers

IEEE Greece Section
National Aerospace University KhAI, Kharkiv, Ukraine
Hellenic Army Academy, Athens, Greece
University of Thessaly, Lamia, Greece
Leeds Beckett University, UK
Lutsk National Technical University, Lutsk, Ukraine
IEEE Student Branch University of Thessaly – Lamia

Background & Key topics

The annual DESSERT conference began in 2006, and its primary focus has been on methodologies, techniques, and tools for dependability, security, and safety assessment, and assurance of software, hardware, computer systems, and IT infrastructures. A lot of related DESSERT WSs covered different issues of dependable critical computing. DESSERT’2025 is responding to current major challenges relating to state-of-the-art information and communication technologies and paradigms such as Internet of Things, cloud and edge computing, AI and Big Data, robotics systems, etc. Relevant areas of interest encompass regulations, analysis, modeling, development, verification, operation, and maintenance of computer systems, networks, and infrastructures for safety-, security-, mission- and business-critical applications.
DESSERT’2025 addresses the main theoretical, methodological, and technological challenges related to Dependable, Resilient and Trustworthy Artificial Intelligence, Internet of Everything, VR/AR and Big Data Analytics for a Safe and Secure World. Authors are invited to submit original manuscripts demonstrating recent advances in all areas relevant to these challenges, including, but not limited to:

Fundamentals and methodologies

  • Methodology and technologies of dependable and resilient computing
  • Methodologies and technologies of smart and pervasive computing
  • Methodologies and technologies of sustainable and green computing and communications
  • Infrastructure safety and security regulation, assessment and assurance
  • Multi-sectoral cybersecurity and safety analysis and assurance
  • Safety, cybersecurity, and resilience of Industry 4.0 and 5.0
  • AI/ML/LLM for design, safety, and security of intelligent systems
  • Cryptography and information security
  • Privacy and personal & information society data protection
  • Privacy and security ethical issues
  • Big Data Analytics vs safety and security

Methods and technologies

  • Dependable IoT for human and industry domains
  • Trustworthy and explainable AI, AI as a Service, and resilient AI systems
  • Methods and scenarios of AI-powered protection against AI-powered attacks
  • Human-machine interaction and cooperation for safety and security
  • Dependability, security, and resilience of web, cloud- and edge computing
  • Big data and data mining techniques for business and critical domains
  • Augmented, virtual, and mixed reality for secure industrial and human applications
  • Blockchain technology for critical and business domains
  • Formal methods and assurance case-based techniques of development and assessment
  • Quantum computing and post-quantum cryptography
  • Cryptography and steganography technologies
  • Image processing and recognition for smart and dependable systems
  • 5G/6G communications

Domains and applications

  • Protecting critical infrastructures from cyberattacks
  • Smart grid cybersecurity and resilience
  • Reliability and safety of unmanned vehicles and UV swarms and fleets
  • UAV swarms/fleets for intellectual systems of monitoring critical objects
  • Dependability of mission-critical aviation and space systems
  • Safety and cybersecurity of industrial robots and robotics systems as a Service
  • Cybersecurity and privacy of health systems
  • Intellectual transport systems
  • Biomedical Engineering and Informatics
  • Ecology monitoring and decision-making support
  • Dependable communication and high-reliable electronics
  • UI cooperation, networking, education, and training for business and critical domains
  • Collaborative networked organizations for security

The conference will include special events (workshops, tutorials, industrial panels) including sessions dedicated to special topics.

Flag Counter