• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Conferences
  • Home
  • /Conferences

Call for Submissions: IEEE SVCC

Conference dates: 10 - 12 June, 2026 | San Jose, California, USA

The IEEE Silicon Valley Cybersecurity Conference (SVCC)

The Silicon Valley Cybersecurity Conference, supported by the Silicon Valley Cybersecurity Institute (SVCSI), a nonprofit organization, brings together researchers, practitioners, educators, underrepresented communities, and others interested in the latest advances in cybersecurity, privacy, data protection, networking, cloud computing, software, and emerging technologies.

Learn More


Why Participate?

  • Share your work with international experts and peers, and gain valuable feedback

Opportunities

  • Present your emerging ideas and applications
  • Showcase your demos of innovative systems, tools, prototypes, and interactive experiences
  • Utilize your platform to share new advances, ideas, and solutions
  • Highlight your contributions
  • Contribute to event programming and technical content
  • Experience groundbreaking keynote speeches, peer-reviewed technical papers, and posters
  • Take part in emerging presentations and demos

Topics

  • Network Security
    • ­ Intrusion and anomaly detection and prevention

    • ­ Attack detection, prevention, or mitigation

    • ­ Cryptography for network security

    • ­ Denial-of-service attacks and countermeasures

    • ­ Mobile and wireless network security

    • System and Hardware Security

    • Security primitives in system architecture and systems

    • ­ Side-channel attacks and mitigation

    • ­ Anti-counterfeit, anti-tamper

    • ­ Hardware obfuscation

    • ­ FPGA design and security

    • ­ Cryptographic processors

    • ­ Post-quantum security primitives

    • On-device AI security

    • Robotics security and safety

  • Blockchain Security
    • Security and privacy in decentralized applications

    • ­ Distributed consensus protocols

    • ­ Blockchain theory and algorithms

    • ­ Communication protocols and standards for dApps

    • ­ Decentralized identity and identity management

  • Software Security
    • Secure software design/architecture

    • ­ Secure software practices

    • ­ Security analysis tools and methods

    • ­ Security evaluation criteria and methodology

    • ­ Vulnerability, threat, and risk analysis

    • ­ Malware detection/intrusion detection

    • ­ Obfuscation and software security

  • AI Cybersecurity

    • ML/DL security and privacy

    • LLM applications in cybersecurity and data protection

    • Privacy-preserving AI models

    • Adversarial attacks and defenses for ML/DL

    • LLM security attacks and defenses

    • ​Privacy protections for AI applications

  • HCI for Cybersecurity
    • Behavior-based cybersecurity

    • ­Human detection of trusted execution

    • ­ HCI for web technologies

    • ­ HCI for mobile or cloud computing

    • ­ Smart cities

    • ­ Social networks

    • User privacy

    • Cyber Security Application and Technology

    • VR/AR systems

    • Ethical, social, and legal implications of AI and LLMs in cybers

Submit Your Content

In addition to submitting your paper to IEEE SVCC 2026, you are also encouraged to upload the data related to your paper to IEEE DataPort.  IEEE DataPort is IEEE’s data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility.  Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive.  Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission.  Thank you!

LATEST NEWS
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Read Next

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

How AI Is Transforming Fraud Detection in Financial Transactions

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter