• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Conferences
  • Home
  • /Conferences

Call for Submissions: IEEE SVCC

Conference dates: 10 - 12 June, 2026 | San Jose, California, USA

The IEEE Silicon Valley Cybersecurity Conference (SVCC)

The Silicon Valley Cybersecurity Conference, supported by the Silicon Valley Cybersecurity Institute (SVCSI), a nonprofit organization, brings together researchers, practitioners, educators, underrepresented communities, and others interested in the latest advances in cybersecurity, privacy, data protection, networking, cloud computing, software, and emerging technologies.

Learn More


Why Participate?

  • Share your work with international experts and peers, and gain valuable feedback

Opportunities

  • Present your emerging ideas and applications
  • Showcase your demos of innovative systems, tools, prototypes, and interactive experiences
  • Utilize your platform to share new advances, ideas, and solutions
  • Highlight your contributions
  • Contribute to event programming and technical content
  • Experience groundbreaking keynote speeches, peer-reviewed technical papers, and posters
  • Take part in emerging presentations and demos

Topics

  • Network Security
    • ­ Intrusion and anomaly detection and prevention

    • ­ Attack detection, prevention, or mitigation

    • ­ Cryptography for network security

    • ­ Denial-of-service attacks and countermeasures

    • ­ Mobile and wireless network security

    • System and Hardware Security

    • Security primitives in system architecture and systems

    • ­ Side-channel attacks and mitigation

    • ­ Anti-counterfeit, anti-tamper

    • ­ Hardware obfuscation

    • ­ FPGA design and security

    • ­ Cryptographic processors

    • ­ Post-quantum security primitives

    • On-device AI security

    • Robotics security and safety

  • Blockchain Security
    • Security and privacy in decentralized applications

    • ­ Distributed consensus protocols

    • ­ Blockchain theory and algorithms

    • ­ Communication protocols and standards for dApps

    • ­ Decentralized identity and identity management

  • Software Security
    • Secure software design/architecture

    • ­ Secure software practices

    • ­ Security analysis tools and methods

    • ­ Security evaluation criteria and methodology

    • ­ Vulnerability, threat, and risk analysis

    • ­ Malware detection/intrusion detection

    • ­ Obfuscation and software security

  • AI Cybersecurity

    • ML/DL security and privacy

    • LLM applications in cybersecurity and data protection

    • Privacy-preserving AI models

    • Adversarial attacks and defenses for ML/DL

    • LLM security attacks and defenses

    • ​Privacy protections for AI applications

  • HCI for Cybersecurity
    • Behavior-based cybersecurity

    • ­Human detection of trusted execution

    • ­ HCI for web technologies

    • ­ HCI for mobile or cloud computing

    • ­ Smart cities

    • ­ Social networks

    • User privacy

    • Cyber Security Application and Technology

    • VR/AR systems

    • Ethical, social, and legal implications of AI and LLMs in cybers

Submit Your Content

In addition to submitting your paper to IEEE SVCC 2026, you are also encouraged to upload the data related to your paper to IEEE DataPort.  IEEE DataPort is IEEE’s data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility.  Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive.  Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission.  Thank you!

LATEST NEWS
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization
Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization
The Road Ahead: Preparing for 2030’s Digital Oil & Gas
The Road Ahead: Preparing for 2030’s Digital Oil & Gas
Celebrating Innovation at TechX Florida 2025
Celebrating Innovation at TechX Florida 2025
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Read Next

The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators

Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization

The Road Ahead: Preparing for 2030’s Digital Oil & Gas

Celebrating Innovation at TechX Florida 2025

Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter