• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Conferences
  • Home
  • /Conferences

Call for Submissions: IEEE SVCC

Conference dates: 10 - 12 June, 2026 | San Jose, California, USA

The IEEE Silicon Valley Cybersecurity Conference (SVCC)

The Silicon Valley Cybersecurity Conference, supported by the Silicon Valley Cybersecurity Institute (SVCSI), a nonprofit organization, brings together researchers, practitioners, educators, underrepresented communities, and others interested in the latest advances in cybersecurity, privacy, data protection, networking, cloud computing, software, and emerging technologies.

Learn More


Why Participate?

  • Share your work with international experts and peers, and gain valuable feedback

Opportunities

  • Present your emerging ideas and applications
  • Showcase your demos of innovative systems, tools, prototypes, and interactive experiences
  • Utilize your platform to share new advances, ideas, and solutions
  • Highlight your contributions
  • Contribute to event programming and technical content
  • Experience groundbreaking keynote speeches, peer-reviewed technical papers, and posters
  • Take part in emerging presentations and demos

Topics

  • Network Security
    • ­ Intrusion and anomaly detection and prevention

    • ­ Attack detection, prevention, or mitigation

    • ­ Cryptography for network security

    • ­ Denial-of-service attacks and countermeasures

    • ­ Mobile and wireless network security

    • System and Hardware Security

    • Security primitives in system architecture and systems

    • ­ Side-channel attacks and mitigation

    • ­ Anti-counterfeit, anti-tamper

    • ­ Hardware obfuscation

    • ­ FPGA design and security

    • ­ Cryptographic processors

    • ­ Post-quantum security primitives

    • On-device AI security

    • Robotics security and safety

  • Blockchain Security
    • Security and privacy in decentralized applications

    • ­ Distributed consensus protocols

    • ­ Blockchain theory and algorithms

    • ­ Communication protocols and standards for dApps

    • ­ Decentralized identity and identity management

  • Software Security
    • Secure software design/architecture

    • ­ Secure software practices

    • ­ Security analysis tools and methods

    • ­ Security evaluation criteria and methodology

    • ­ Vulnerability, threat, and risk analysis

    • ­ Malware detection/intrusion detection

    • ­ Obfuscation and software security

  • AI Cybersecurity

    • ML/DL security and privacy

    • LLM applications in cybersecurity and data protection

    • Privacy-preserving AI models

    • Adversarial attacks and defenses for ML/DL

    • LLM security attacks and defenses

    • ​Privacy protections for AI applications

  • HCI for Cybersecurity
    • Behavior-based cybersecurity

    • ­Human detection of trusted execution

    • ­ HCI for web technologies

    • ­ HCI for mobile or cloud computing

    • ­ Smart cities

    • ­ Social networks

    • User privacy

    • Cyber Security Application and Technology

    • VR/AR systems

    • Ethical, social, and legal implications of AI and LLMs in cybers

Submit Your Content

In addition to submitting your paper to IEEE SVCC 2026, you are also encouraged to upload the data related to your paper to IEEE DataPort.  IEEE DataPort is IEEE’s data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility.  Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive.  Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission.  Thank you!

LATEST NEWS
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains
From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains
Read Next

The AI Adoption Gap: Why Enterprise AI Fails After Deployment

Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces

From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains

An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Why Your Computer Science Degree Is No Longer Enough in 2026

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter