๐—ฆ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ผ๐—ป ๐—ก๐—ฎ๐˜๐˜‚๐—ฟ๐—ฎ๐—น ๐—Ÿ๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐˜€๐˜€๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—”๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น 
๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† (๐—ก๐—Ÿ๐—ฃ๐—”๐—œ๐—–๐—ฆโ€™๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ)

University of Alicante, Alicante, Spain

11 and 12 June 2026

https://nlpaics2026.gplsi.es/

๐’๐ž๐œ๐จ๐ง๐ ๐‚๐š๐ฅ๐ฅ ๐Ÿ๐จ๐ซ ๐๐š๐ฉ๐ž๐ซ๐ฌ

Recent advances in Natural Language Processing (NLP), Deep Learning and Large 
Language Models (LLMs) have resulted in improved performance of applications.  
In particular, there has been a growing interest in employing AI methods in 
different Cyber Security applications.

In today's digital world, Cyber Security has emerged as a heightened priority 
for both individual users and organisations.  As the volume of online 
information grows exponentially, traditional security approaches often struggle 
to identify and prevent evolving security threats. The inadequacy of 
conventional security frameworks highlights the need for innovative solutions 
that can effectively navigate the complex digital landscape to ensure robust 
security. NLP and AI in Cyber Security have vast potential to significantly 
enhance threat detection and mitigation by fostering the development of 
advanced security systems for autonomous identification, assessment, and 
response to security threats in real-time. Recognising this challenge and the 
capabilities of NLP and AI approaches to fortify Cyber Security systems, the 
Second International Conference on Natural Language Processing (NLP) and 
Artificial Intelligence (AI) for Cyber Security (NLPAICSโ€™2026) continues the 
tradition from NLPAICSโ€™2024 to be a gathering place for researchers in NLP and 
AI methods for Cyber Security. We invite contributions that present the latest 
NLP and AI solutions for mitigating risks in processing digital information.

๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜๐—ผ๐—ฝ๐—ถ๐—ฐ๐˜€

The conference invites submissions on a broad range of topics related to the 
employment of NLP and AI (and in general, language studies and models) for 
Cyber Security including but not limited to:

- ๐˜š๐˜ฐ๐˜ค๐˜ช๐˜ฆ๐˜ต๐˜ข๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ถ๐˜ฎ๐˜ข๐˜ฏ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ข๐˜ง๐˜ฆ๐˜ต๐˜บ
  - Content Legitimacy and Quality
    - Detection and mitigation of hate speech and offensive language
    - Fake news, deepfakes, misinformation and disinformation
    - Detection of machine generated language in multimodal context (text, 
speech and gesture)
    - Trust and credibility of online information
  - User Security and Safety
    - Cyberbullying and identification of internet offenders
    - Monitoring extremist fora
    - Suicide prevention
    - Clickbait and scam detection
    - Fake profile detection in online social networks
  - Technical Measures and Solutions
    - Social engineering identification, phishing detection
    - NLP for risk assessment
    - Controlled languages for safe messages
    - Prevention of malicious use of ai models
    - Forensic linguistics
  - Human Factors in Cyber Security

- ๐˜š๐˜ฑ๐˜ฆ๐˜ฆ๐˜ค๐˜ฉ ๐˜›๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ฐ๐˜ญ๐˜ฐ๐˜จ๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜”๐˜ถ๐˜ญ๐˜ต๐˜ช๐˜ฎ๐˜ฐ๐˜ฅ๐˜ข๐˜ญ ๐˜๐˜ฏ๐˜ท๐˜ฆ๐˜ด๐˜ต๐˜ช๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
  - Voice-based security: Analysis of voice recordings or transcripts for 
security threats
  - Detection of machine generated language in multimodal context (text, speech 
and gesture)
  - NLP and biometrics in multimodal context

- ๐˜‹๐˜ข๐˜ต๐˜ข ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ฐ๐˜ง๐˜ต๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
  - Cryptography
  - Digital forensics
  - Malware detection, obfuscation
  - Models for documentation
  - NLP for data privacy and leakage prevention (DLP)
  - Addressing dataset โ€œpoisoningโ€ attacks

- ๐˜๐˜ถ๐˜ฎ๐˜ข๐˜ฏ-๐˜Š๐˜ฆ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต
  - Natural language understanding for chatbots: NLP-powered chatbots for user 
support and security incident reporting
  - User behaviour analysis: analysing user-generated text data (e.g., chat 
logs and emails) to detect insider threats or unusual behaviour
  - Human supervision of technology for Cyber Security

- ๐˜ˆ๐˜ฏ๐˜ฐ๐˜ฎ๐˜ข๐˜ญ๐˜บ ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜›๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜๐˜ฏ๐˜ต๐˜ฆ๐˜ญ๐˜ญ๐˜ช๐˜จ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ
  - Text-Based Anomaly Detection
    - Identification of unusual or suspicious patterns in logs, incident 
reports or other textual data
    - Detecting deviations from normal behaviour in system logs or network 
traffic
  - Threat Intelligence Analysis
    - Processing and analysing threat intelligence reports, news, articles and 
blogs on latest Cyber Security threats
    - Extracting key information and indicators of compromise (IoCs) from 
unstructured text

- ๐˜š๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
  - Systems Security
    - Anti-reverse engineering for protecting privacy and anonymity
    - Identification and mitigation of side-channel attacks
    - Authentication and access control
    - Enterprise-level mitigation
    - NLP for software vulnerability detection
  - Malware Detection through Code Analysis
    - Analysing code and scripts for malware
    - Detection using NLP to identify patterns indicative of malicious code

- ๐˜๐˜ช๐˜ฏ๐˜ข๐˜ฏ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
  - Financial fraud detection
  - Financial risk detection
  - Algorithmic trading security
  - Secure online banking
  - Risk management in finance
  - Financial text analytics

- ๐˜Œ๐˜ต๐˜ฉ๐˜ช๐˜ค๐˜ด, ๐˜‰๐˜ช๐˜ข๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜“๐˜ฆ๐˜จ๐˜ช๐˜ด๐˜ญ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ช๐˜ฏ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
  - Ethical and Legal Issues
    - Digital privacy and identity management
    - The ethics of NLP and speech technology
    - Explainability of NLP and speech technology tools
    - Legislation against malicious use of AI
    - Regulatory issues
  - Bias and Security
    - Bias in Large Language Models (LLMs)
    - Bias in security related datasets and annotations

- ๐˜‹๐˜ข๐˜ต๐˜ข๐˜ด๐˜ฆ๐˜ต๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜™๐˜ฆ๐˜ด๐˜ฐ๐˜ถ๐˜ณ๐˜ค๐˜ฆ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ˆ๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด

- ๐˜š๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ด๐˜ฆ๐˜ฅ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ˆ๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜–๐˜ฑ๐˜ฆ๐˜ฏ ๐˜›๐˜ฐ๐˜ฑ๐˜ช๐˜คs
  - Intelligence applications
  - Emerging and innovative applications in Cyber Security


๐˜š๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜›๐˜ฉ๐˜ฆ๐˜ฎ๐˜ฆ ๐˜›๐˜ณ๐˜ข๐˜ค๐˜ฌ - ๐˜๐˜ถ๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ฐ๐˜ง ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜Œ๐˜ณ๐˜ข ๐˜ฐ๐˜ง ๐˜“๐˜“๐˜”๐˜ด ๐˜ข๐˜ฏ๐˜ฅ 
๐˜Ž๐˜ฆ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ˆ๐˜

NLPAICS 2026 will feature a special theme track with the goal of stimulating 
discussion around Large Language Models (LLMs), Generative AI and ensuring 
their safety.  The latest generation of LLMs, such as CHATGPT, Gemini, 
DeepSeek, LLAMA and open-source alternatives, has showcased remarkable 
advancements in text and image understanding and generation. However, as we 
navigate through uncharted territory, it becomes imperative to address the 
challenges associated with employing these models in everyday tasks, focusing 
on aspects such as fairness, ethics, and responsibility. The theme track 
invites studies on how to ensure the safety of LLMs in various tasks and 
applications and what this means for the future of the field. The possible 
topics of discussion include (but are not limited to) the following:
  โ€ข Detection of LLM-generated language in multimodal context (text, speech and 
gesture)
  โ€ข LLMs for forensic linguistics
  โ€ข Bias in LLMs
  โ€ข Safety benchmarks for LLMs
  โ€ข Legislation against malicious use of LLMs
  โ€ข Tools to evaluate safety in LLMs
  โ€ข  Methods to enhance the robustness of language models


๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป
NLPAICS welcomes high-quality submissions in English, which can take two forms:
  โ€ข Regular long papers: These can be up to eight (8) pages long, presenting 
substantial, original, completed, and unpublished work.
  โ€ข Short (poster) papers: These can be up to four (4) pages long and are 
suitable for describing small, focused contributions, ongoing research, 
negative results, system demonstrations, etc. Short papers will be presented as 
part of a poster session.

The conference will not consider and evaluate abstracts only.

Accepted papers, including both long and short papers, will be published as 
e-proceedings with ISBN will available online on the conference website at the 
time of the conference and are expected to be uploaded into the ACL Anthology.

To prepare your submission, please make sure to use the NLPAICS 2026 style 
files available here -
Latex -   https://www.overleaf.com/read/sgwmrzbmjfhc#aeea77
Word -   
https://nlpaics2026.gplsi.es/wp-content/uploads/2025/11/NLPAICS2026_Proceedings_Template.docx

Papers should be submitted through Softconf/START using the following link: 
https://softconf.com/p/nlpaics2026/user/

The conference will feature a student workshop, and awards will be offered to 
the authors of the best papers.

๐—œ๐—บ๐—ฝ๐—ผ๐—ฟ๐˜๐—ฎ๐—ป๐˜ ๐—ฑ๐—ฎ๐˜๐—ฒ๐˜€
  โ€ข Submissions due: 16 March 2026
  โ€ข Reviewing process: 1 April โ€“ 30 April 2026
  โ€ข Notification of acceptance: 5 May 2026
  โ€ข Camera-ready due: 19 May 2026
  โ€ข Conference camera-ready proceedings ready 1 June 2026
  โ€ข Conference: 11-12 June 2026


๐—ข๐—ฟ๐—ด๐—ฎ๐—ป๐—ถ๐˜€๐—ฎ๐˜๐—ถ๐—ผ๐—ป
๐™ฒฬฒ๐š˜ฬฒ๐š—ฬฒ๐šฬฒ๐šŽฬฒ๐š›ฬฒ๐šŽฬฒ๐š—ฬฒ๐šŒฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ๐šœฬฒโ€€ฬฒ
Ruslan Mitkov (University of Alicante)
Rafael Muรฑoz (University of Alicante)


๐™ฟฬฒ๐š›ฬฒ๐š˜ฬฒ๐šฬฒ๐š›ฬฒ๐šŠฬฒ๐š–ฬฒ๐š–ฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š˜ฬฒ๐š–ฬฒ๐š–ฬฒ๐š’ฬฒ๐šฬฒ๐šฬฒ๐šŽฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ๐šœฬฒ
Elena Lloret (University of Alicante)
Tharindu Ranasinghe (Lancaster University)

๐™ฟฬฒ๐šžฬฒ๐š‹ฬฒ๐š•ฬฒ๐š’ฬฒ๐šŒฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Ernesto Estevanell (University of Alicante)

๐š‚ฬฒ๐š™ฬฒ๐š˜ฬฒ๐š—ฬฒ๐šœฬฒ๐š˜ฬฒ๐š›ฬฒ๐šœฬฒ๐š‘ฬฒ๐š’ฬฒ๐š™ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Andres Montoyo (University of Alicante)

๐š‚ฬฒ๐šฬฒ๐šžฬฒ๐šฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒโ€€ฬฒ๐š†ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒ๐šœฬฒ๐š‘ฬฒ๐š˜ฬฒ๐š™ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Salima Lamsiyah (University of Luxembourg)

๐™ฑฬฒ๐šŽฬฒ๐šœฬฒ๐šฬฒโ€€ฬฒ๐™ฟฬฒ๐šŠฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒโ€€ฬฒ๐™ฐฬฒ๐š ฬฒ๐šŠฬฒ๐š›ฬฒ๐šฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Saad Ezzini (King Fahd University of Petroleum & Minerals)

๐™ฟฬฒ๐šžฬฒ๐š‹ฬฒ๐š•ฬฒ๐š’ฬฒ๐šŒฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Beatriz Botella (University of Alicante)

๐š‚ฬฒ๐š˜ฬฒ๐šŒฬฒ๐š’ฬฒ๐šŠฬฒ๐š•ฬฒโ€€ฬฒ๐™ฟฬฒ๐š›ฬฒ๐š˜ฬฒ๐šฬฒ๐š›ฬฒ๐šŠฬฒ๐š–ฬฒ๐š–ฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Alba Bonet (University of Alicante)

๐—ฉ๐—ฒ๐—ป๐˜‚๐—ฒ
The Second International Conference on Natural Language Processing and 
Artificial Intelligence for Cyber Security (NLPAICSโ€™2026) will take place at 
the University of Alicante and is organised by the University of Alicante GPLSI 
research group.

Further information and contact details

The follow-up calls will list keynote speakers and members of the programme 
committee once confirmed.

The conference website is https://nlpaics2026.gplsi.es/ and will be updated on 
a regular basis. For further information, please email [email protected]

Registration will open in February 2026.

Best Regards
Tharindu Ranasinghe


Dr Tharindu Ranasinghe | Lecturer in Security and Protection Science
School of Computing and Communications | Lancaster University
www.lancaster.ac.uk<https://www.lancaster.ac.uk/>

Reply via email to