DESSERT’2025

15th International Conference
Dependable Systems, Services and Technologies
Greece, Athens, December 19-21, 2025
hybrid mode (i.e., using remote audio/video support
and as an in-person event)

IEEE
  • Conference Programme


  • Conference Programme is available here.

  • Important Dates

    Workshop proposal submission: October 10, 2025

    Notification of Workshop proposal acceptance: October 12, 2025

    Paper submission: November 3, 2025 November 17, 2025

    Notification of paper acceptance: November 21, 2025 November 28, 2025

    Final manuscript: November 28, 2025 December 1, 2025

    Registration and payment: November 30, 2025 December 2, 2025

    Program draft publication: December 1, 2025 December 4, 2025

    Conference date: December 19-21, 2025

  • Contacts

    Department 503, DESSERT’2025 Organizing Committee,
    National Aerospace University “KhAI”,
    Vadym Manko str., 17, Kharkiv, 61070, Ukraine
    Olena Surynovych
    Phone: +38 (066) 5389293,
    +38 (096) 1305556
    e-mail: dessert@csn.khai.edu

    www: dessert-conf.org

  • Archive

  • DESSERT'2022

    DESSERT'2023

    DESSERT'2024

Securing the Future: AI-Driven Defense and Strategies for Dependable Systems (AID3S2)

WS Co-Chairs

ANATOLIY SACHENKO. Honoured Inventor of Ukraine, Doctor of Technical Sciences, Professor at the West Ukrainian National University, Director of the Research Institute of Intelligent Computer Systems, Ternopil, Ukraine. Professor at the Casimir Pulaski Radom University, Poland. His research interests include microprocessor systems, intelligent measuring devices, and information and measurement systems and complexes at critical infrastructure facilities.
SERGII LYSENKO. Full Doctor, Full Professor of the Computer Engineering & Information Systems Department in Khmelnytskyi National University. The author has been working for more than 15 years in the field of increasing the effectiveness of detecting malicious software and cyberattacks, in particular: the theory and practice of creating multi-agent and distributed systems for detecting malicious software in computer networks, creating an adaptive technology for detecting cyber threats in computer networks.
GEORGE MARKOWSKY. Professor Emeritus at the University of Maine. He has published over 115 journal papers, book chapters, book reviews, and conference papers on various aspects of Computer Science and Mathematics. He has written or edited 15 books and reports on various aspects of computing. He also holds a patent in the area of Universal Hashing. His interests range from pure mathematics to the application of mathematics and computer science to biological problems. He has also built voice-controlled and enhanced keyboard terminals for use by paralyzed individuals. His primary interests are Cybersecurity, Algorithms, Applied Mathematics, Homeland Security, Emergency Management, Quantum Computing, and Bioinformatics.

Abstract and Motivation

This Workshop directly addresses the DESSERT 2025 theme, “Trustworthy and Resilient AI Systems for a Safe and Secure World,” by focusing on the critical intersection of cybersecurity, artificial intelligence, and dependable systems. As society’s reliance on complex, interconnected systems (from IoT to cloud, Edge and critical infrastructures) deepens, the attack surface for sophisticated cyber threats expands. Traditional, reactive security measures are no longer sufficient.

The motivation for this Workshop is to explore the necessary paradigm shift from traditional cybersecurity to proactive, AI-driven defense. We aim to bring together researchers and practitioners to discuss novel methodologies for building and assuring systems that are not only secure by design but also resilient in the face of AI-powered attacks. This Workshop will foster discussion on the techniques needed to build the next generation of trustworthy and secure services.

Topics of Interest

This Workshop invites contributions on all aspects of cybersecurity as it relates to dependable systems and AI, including but not limited to:

  • AI for Security and Safety. Methods for AI/ML-driven threat detection, intrusion response, and vulnerability analysis.
  • Security of AI. Techniques for securing AI/ML models (e.g., adversarial learning, data poisoning defense, and model verification).
  • Resilience and Dependability. Designing systems that maintain critical functions during and after a cyberattack.
  • Critical Infrastructure Security and Defense. Protecting Industry 4.0, smart grids, and healthcare systems.
  • Privacy in a Secure World. Privacy-preserving technologies, data protection, and ethical considerations in security.
  • Future-Proofing Security. Post-quantum cryptography, blockchain applications for security, and securing the Internet of Everything (IoE).
  • Assurance and Formal Methods. Verification and validation techniques for secure and dependable systems.

Target Audience

The Workshop AID3S2 should attract the researchers, PhD students, and industry practitioners working in the fields of cybersecurity, dependable systems, safety-critical systems, artificial intelligence, and software engineering. It will provide a forum for sharing early-stage research, discussing new challenges, and fostering collaboration.

Flag Counter