IWAPS

International Workshop on Advances on Security and Privacy Technologies and Solutions

Workshops Lettering

Workshop Chairs

Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo
  • → Christos Xenakis
  • → Aristeidis Farao
  • → Apostolis Zarras

Detail 01/04

Topics of interest include, but are not limited to 02/04

  • Adversarial machine learning: attacks, defenses, and robustness
  • Protection mechanisms against adversarial ML attacks
  • Threat and attack models for adversarial AI systems
  • Deep learning for security and privacy
  • ML-based intrusion, anomaly, and malware detection
  • ML techniques for deep packet inspection
  • ML-assisted analysis and verification of cryptographic protocols
  • Privacy-preserving optimization and machine learning
  • Trust frameworks and trust management models for IoT systems
  • Threat modeling and attack surfaces in IoT environments
  • End-to-end security models for IoT and cyber-physical systems
  • Privacy-preserving technologies and solutions for IoT platforms
  • Distributed and federated privacy-preserving algorithms
  • Self sovereign identity
  • Privacy policies, regulatory compliance, and legal challenges
  • Governance models for trustworthy and accountable AI
  • Legal and policy aspects of privacy-preserving technologies
  • Ethical-by-design and policy-aware AI systems
  • Cybersecurity risk management and assessment
  • Security controls optimization and budget allocation
  • Security economics and investments in cyber defense
  • Human rights, surveillance, and societal implications of privacy technologies
  • Applications of privacy-preserving AI systems
  • End-to-end secure system design and evaluation
  • ML for automated software testing and security validation
  • Benchmarking privacy and security technologies in real-world settings
  • Privacy-preserving and ML-based data analytics
  • AI/ML techniques for cyber threat intelligence
  • Automated attack mitigation and response strategies
  • Game-theoretic models for attack and defense strategies
  • Architectures and protocols for scalable, secure, and privacy-enhancing technologies
  • Quantum cryptography
  • Cryptographic approaches for security and privacy
  • Differential privacy: theory, mechanisms, and applications
  • Privacy-enhancing and anonymization techniques
  • Attacks on data privacy and inference risks
  • Secure and confidential computation
  • Privacy-preserving security and privacy policies
  • Privacy-preserving test cases, datasets, and benchmarks
  • ML-based prediction of the weakest link in system architectures
  • Human factors in adversarial AI and cybersecurity
  • Ethical considerations in adversarial AI systems
  • Psychological, sociological, and anthropological aspects of usable security and privacy
  • Psychological manipulation and influence modeling using ML
  • ML techniques for predicting social engineering and manipulation attacks
  • Human firewall concepts and weakest-link analysis

Workshop Chairs 03/04

Workshop Chairs

Workshop Chairs Logo
Christos Xenakis
University of Piraeus, Greece
Workshop Chairs Logo
Aristeidis Farao
InQbit Innovations SRL, Romania
Workshop Chairs Logo
Apostolis Zarras
Foundation for Research & Technology - Hellas, Greece

Program Committee

Submission 04/04

Important Dates

Submission Deadline May 18, 2026
Author Notification Jun 01, 2026
Proceedings Version Jun 13, 2026
Conference Aug 24 — Aug 27, 2026
Workshop CfPs

Submit to an ARES workshop