CALL FOR PAPERS

The Italian Conference on CyberSecurity (ITASEC) is an annual event started in 2017 and supported and organized by the CINI Cybersecurity National Lab. Like in 2025, for the 2026 edition ITASEC will join forces with the Conference on “Security and Rights in the Cyber Space” (SERICS) supported and organized by the SERICS Foundation under the PNRR (National Recovery and Resilience Plan) – Next Generation EU.

The 2nd Joint National Conference on Cybersecurity (ITASEC26) will take place in Cagliari, from February 9 to February 13, 2026. The venue will be the Faculty of Engineering and Architecture, Piazza d’Armi, Cagliari.

ITASEC26 will be a forum to meet, discuss and exchange experiences among people from academia and industry, from the public and the private sectors, who are interested in cybersecurity and all its applications.

 

The 2026 edition will include (i) a Scientific and Technical (S&T) Track, (ii) presentations of the most relevant results achieved by SERICS Extended Partnership, and (iii) Scientific Keynotes.

IMPORTANT DATES

  • November 21st, 2025: Deadline for Paper submission

  • January 12th, 2026: Author notification

  • February 9th–13th, 2026: Conference

  • February 23rd, 2026: Camera-ready deadline

PAPER SUBMISSION

Two kinds of submissions are solicited:

  • Original, unpublished contributions that will be included in an open-access post-proceeding volume of CEUR Workshop Proceedings, indexed by both Scopus and DBLP;

  • Already published or preliminary work that will not be included in the post-proceedings volume.

Authors are requested to clearly indicate whether they would like to have their paper included in the proceedings volume.

Submissions are single-blind and may indicate the names and affiliations of the authors.

Authors of works of particular interest and quality will be invited to submit their contributions to dedicated Special Issues of indexed journals.

 

Any paper related to cybersecurity is welcome. Topics of interest encompass all areas of cybersecurity, including (but not limited to) the following research domains.

 

  • Access control and authorization

  • AI for security systems

  • Anonymity and Anonymous Communication

  • Big Data security

  • Blockchain and Distributed Ledgers

  • Cloud Security
  • Cryptography and Cryptanalysis
  • Cyber education and training
  • Cyber ranges
  • Data security and privacy
  • Decision support systems
  • Digital forensics
  • Disinformation, fake news and deep fakes
  • Formal models in security
  • Hardware and Device Security
  • Human issues and awareness
  • Identity, Authentication, and Accountability
  • Incident response and management
  • Industry 4.0/5.0 security
  • IoT Security
  • Legal aspects, compliance and regulation
  • Monitoring and detection
  • Network and wireless security
  • Operating System Security
  • Quantum computing security
  • Secure programming and lifecycle management
  • Security Architectures
  • Security in Healthcare
  • Security management and governance
  • Security of AI and Machine learning
  • Security of telecommunications, 5G/6G
  • Security-by-design
  • Smart infrastructure security
  • Software vulnerability detection and assessment
  • Supply chain security
  • Threat intelligence

The topic list is not meant to be exhaustive: papers addressing any aspect of digital security and privacy are welcome. (Although, papers without a clear application to cybersecurity will be considered out of scope.)

Papers Formatting

 

Previously unpublished papers (to appear or not in the proceedings): Papers must be in English, formatted in PDF according to the EasyChair style and not longer than 16 pages, excluding bibliography.

 

Extra material exceeding the page limit can be included in an appendix of at most 4 pages.

 

Previously published papers: Papers can be submitted in their originally published form, without the need for re-editing.

 

Anti-LLM Policy and Plagiarism

 

Papers must not contain or reproduce previously published content without the proper references. Papers that are suspected of plagiarism will be desk rejected without further evaluation.

 

Although we recognize the role of LLM as an aid for paper writing, using them to write large parts of papers or to manage references is strongly discouraged. Papers with incoherent or made-up references will be desk rejected.

 

Papers must be submitted to:

 

https://easychair.org/my/conference?conf=itasec26

Further information is available at https://itasec.it