DESSERT’2025

15th International Conference
Dependable Systems, Services and Technologies
Greece, Athens, December 19-21, 2025
hybrid mode (i.e., using remote audio/video support
and as an in-person event)

IEEE
  • Conference Programme


  • Conference Programme is available here.

  • Important Dates

    Workshop proposal submission: October 10, 2025

    Notification of Workshop proposal acceptance: October 12, 2025

    Paper submission: November 3, 2025 November 17, 2025

    Notification of paper acceptance: November 21, 2025 November 28, 2025

    Final manuscript: November 28, 2025 December 1, 2025

    Registration and payment: November 30, 2025 December 2, 2025

    Program draft publication: December 1, 2025 December 4, 2025

    Conference date: December 19-21, 2025

  • Contacts

    Department 503, DESSERT’2025 Organizing Committee,
    National Aerospace University “KhAI”,
    Vadym Manko str., 17, Kharkiv, 61070, Ukraine
    Olena Surynovych
    Phone: +38 (066) 5389293,
    +38 (096) 1305556
    e-mail: dessert@csn.khai.edu

    www: dessert-conf.org

  • Archive

  • DESSERT'2022

    DESSERT'2023

    DESSERT'2024

Keynote speakers

Prof. Dr. Constantine Coutras, Montclair State University, USA

Contemporary Cybersecurity Issues and Sustainability of Critical Infrastructure

Chris Spirito, Nuclear Cyber Security Consultant, Idaho National Laboratory; Hacker, Sanctum Security, USA

From Chip to Chain Reaction: Understanding Supply Chain Risk across System Scales

Dr. Yannick Fourastier, CodEUrope, France

On Trustworthy Autonomy of Cyber-Physical Systems

Prof. Christos Xenakis, University of Piraeus, Piraeus, Greece

Securing the AI Lifecycle: Trust-by-Design Approaches to Adversarial Threats

Dr. Ioannis Agadakos, Montclair State University, USA

Deus Ex Machina: Emerging Opportunities and Perils in an Agentic World

Prof. Petra Haferkorn, Bonn-Rhein-Sieg University of Applied Science, Germany, Prof. Mariia Dorosh, Chernihiv Polytechnic National University, Ukraine

Social systems theory perspective on information security risk modelling

Flag Counter