DESSERT'2026

16th International Conference
Dependable Systems, Services and Technologies
Greece, Corfu, October 2-4, 2026
hybrid mode (i.e., using remote audio/video support
and as an in-person event)

IEEE
  • Important Dates

    Workshop proposal submission: April 6, 2026

    Notification of Workshop proposal acceptance: April 13, 2026

    Paper submission: May 11, 2026

    Notification of paper acceptance: June 22, 2026

    Final manuscript: June 29, 2026

    Registration and payment: July 6, 2026

    Program draft publication: July 20, 2026

    Conference date: October 2-4, 2026

  • Contacts

    Department 503, DESSERT’2026 Organizing Committee,
    National Aerospace University “KhAI”,
    Vadym Manko str., 17, Kharkiv, 61070, Ukraine
    Olena Surynovych
    Phone: +38 (066) 5389293,
    +38 (096) 1305556
    e-mail: dessert@csn.khai.edu

    www: dessert-conf.org

  • Archive

  • DESSERT'2022

    DESSERT'2023

    DESSERT'2024

    DESSERT'2025

Home

Welcome to DESSERT’2026

The 16th International Conference on
Dependable Systems, Services and Technologies (DESSERT’2026)

2026 Theme:
Dependable, Human‑Aligned and Cyber‑Physical AI Systems for a Safe, Secure and Sustainable World

Greece, Corfu
October 2-4, 2026

Organizers

IEEE Greece Section
National Aerospace University KhAI, Kharkiv, Ukraine
Hellenic Army Academy, Athens, Greece
Ionian University, Corfu, Greece
University of Thessaly, Lamia, Greece
Leeds Beckett University, UK
Lutsk National Technical University, Lutsk, Ukraine
IEEE Student Branch University of Thessaly – Lamia

Background & Key topics

The annual DESSERT conference began in 2006, and its primary focus has been on methodologies, techniques, and tools for dependability, security, and safety assessment, and assurance of software, hardware, computer systems, and IT infrastructures. A number of related DESSERT WSs addressed various issues in dependable critical computing. DESSERT’2026 is responding to current significant challenges relating to state-of-the-art information and communication technologies and paradigms, such as the Internet of Things, cloud and edge computing, AI and Big Data, and robotics systems, especially unmanned aerial, ground, and surface vehicles (UVs). Relevant areas of interest encompass regulations, analysis, modelling, development, verification, operation, and maintenance of computer systems, networks, and infrastructures for safety-, security-, mission- and business-critical applications.
DESSERT’2026 addresses the main theoretical, methodological, and technological challenges related to Dependable, Human‑Aligned and Cyber‑Physical AI Systems for a Safe, Secure and Sustainable World. Authors are invited to submit original manuscripts demonstrating recent advances in all areas relevant to these challenges, including, but not limited to:

Fundamentals and methodologies

  • Methodology and technologies of dependable and resilient computing
  • Methodologies and technologies of smart and pervasive computing
  • Methodologies and technologies of sustainable and green computing and communications
  • Infrastructure safety and security regulation, assessment and assurance
  • Safety and Security co-design, verification and validation
  • Safety, cybersecurity, and resilience of Industry 4.0 and 5.0
  • AI/ML/LLM for design, safety, and security of intelligent systems
  • Cryptography and information security
  • Privacy and personal & information society data protection
  • Big Data Analytics vs and for safety and security

Methods and technologies

  • Dependable IoT for human and industry domains
  • Trustworthy and explainable AI, AI as a Service, and resilient AI systems
  • Methods and scenarios of AI-powered protection against AI-powered attacks
  • Human-machine interaction and cooperation for safety and security
  • Dependability, security, and resilience of web, cloud, and edge computing
  • Big data and data mining techniques for business and critical domains
  • Augmented, virtual, and mixed reality for secure industrial and human applications
  • Blockchain technology for critical and business domains
  • Formal methods and assurance case-based techniques of development and assessment
  • Quantum computing and post-quantum cryptography
  • Cryptography and steganography technologies
  • Image processing and recognition for smart and dependable systems
  • 5G/6G communications

Domains and applications

  • Protecting critical infrastructures from cyberattacks
  • Smart grid cybersecurity and resilience
  • Reliability and safety of unmanned vehicles, UV swarms and fleets
  • Intelligent UV swarms for monitoring critical objects and overcoming dangerous spaces
  • Dependability of mission-critical, aviation and space systems
  • Safety and cybersecurity of industrial robots and robotics systems as a Service
  • Cybersecurity and privacy of health systems
  • Biomedical engineering and informatics
  • Ecology monitoring and decision-making support
  • Dependable communication and high-reliable electronics
  • UI cooperation, networking, education, and training for business and critical domains

The conference will include special events (workshops, tutorials, and industrial panels) and sessions dedicated to special topics.

Hot Topics for Discussion

  • Dependable and Trustworthy Systems Foundation and Agentic Models.
  • Trust, Governance and Regulation of AI‑Enabled Critical Systems and Infrastructures.
  • Human–AI synergy, Explainability and Decision Support in Security and Safety‑Critical Domains.
  • Secure, Safe and Resilient Cyber‑Physical Systems with Embedded AI.
  • Privacy‑Preserving, Federated and Edge AI for IoT/IoE and Robotics.
  • AI Driven Cyber Defense and Autonomous Threat Hunting.
  • Using machine learning/LLMs/agents for real-time detection, hunting and response to attacks.
  • Combining classic NIDS/SIEM with generative AI, behavioral analytics, etc.
  • Adversarial Machine Learning and Secure AI Pipelines.
  • Poisoning, evasion, inference, model stealing attacks and defenses.
  • Secure/robust training pipelines, data provenance, model watermarking, red teaming of AI systems.
  • Use of cryptographic/formal methods for integrity & confidentiality in AI lifecycle.
  • Edge/IoT device protection with lightweight crypto, embedded AI, zero trust architectures.
  • End to end security & observability with AI enhanced monitoring.
Flag Counter