top of page

Call for Papers

Paper Submission Deadline: December 15, 2025

Scope and Motivation

The Silicon Valley Cybersecurity Conference (SVCC) is an annual international conference in cybersecurity held at the heart of Silicon Valley, which is supported by the Silicon Valley Cybersecurity Institute (SVCSI). SVCC focuses on research in dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems.

This conference is a forum to present research in robustness and resilience in a wide spectrum of computing systems and networks. All aspects of the research and practice of applied security are within the scope of this conference. Relevant topics include innovative system design, protocols, and algorithms for detecting, preventing, mitigating, and responding to malicious threats in dependable and secure systems and networks including experimentation and assessment. The topics of interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare.

Important Deadlines

Research Paper Deadline: December 15, 2025 at Midnight (PST)

Notification: Feb 10, 2026

Camera-ready: Feb. 28, 2026

​​

Two best paper awards will be available for non-student and student authors. The awardee will receive $500 cash.

Policy

All Regular, Short, Workshop and Poster Papers must adhere to the following page limit rules:

  1. Regular Research Papers: 6-8 pages 

  2. Poster Papers: 2-3 pages

All the papers will be published through IEEE Xplore. 

Author Changes or Title Change Policy

In order to ensure an appropriate consideration of conflicts of interest in the review process, IEEE SVCC  prohibits any change to the list of authors and/or the title of a paper when the paper is under review or if accepted for final publication. The author list or the title of a paper may be changed only prior to the submission deadline.

No Show Policy

For All (Regular/Short/Poster) Paper Authors: Authors are required to present their paper at the conference in order for a paper to appear in the conference proceedings (except for authors in the online forum session). Registration receipts and proceedings will be available only for papers that are presented. Your paper will be excluded from being published and included in the IEEE Xplore and the CSDL should your paper fail to be presented at the conference. Any exceptions to this policy can only be made by the General and Program Chairs. IEEE always reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference. https://ieeemce.org/planning-basics/ieee-conference-publications/setting-paper-submission-guidelines/

Camera-ready Instructions

​You can read the camera-ready instruction below after your paper is accepted in Feb.​ Camera-ready submission: PDF Instructions for Authors Before Creating a PDF • Proofread your source document thoroughly to confirm that it will require no revision. Creating your PDF eXpress Account Log in to the IEEE PDF eXpress TM site (https://ieee-pdf-express.org/account/login?ReturnUrl=%2F) First-time users should do the following:     1. Select the New Users - Click Here link.     2. Enter the following:          • XXXXX for the Conference ID          • your email address          • a password     3. Continue to enter information as prompted. An Online confirmation will be displayed and an email confirmation will be sent verifying your account setup.

Topics of interest (including but not limited to):

01

Network Security

  • ­ Intrusion and anomaly detection and prevention

  • ­ Attack detection, prevention, or mitigation

  • ­ Cryptography for network security

  • ­ Denial-of-service attacks and countermeasures

  • ­ Mobile and wireless network security

04

System and Hardware Security

  • Security primitives in system architecture and systems

  • ­ Side-channel attacks and mitigation

  • ­ Anti-counterfeit, anti-tamper

  • ­ Hardware obfuscation

  • ­ FPGA design and security

  • ­ Cryptographic processors

  • ­ Post-quantum security primitives

  • On-device AI security

  • Robotics security and safety

02

Blockchain Security

  • Security and privacy in decentralized applications

  • ­ Distributed consensus protocols

  • ­ Blockchain theory and algorithms

  • ­ Communication protocols and standards for dApps

  • ­ Decentralized identity and identity management

05

Software Security

  • Secure software design/architecture

  • ­ Secure software practices

  • ­ Security analysis tools and methods

  • ­ Security evaluation criteria and methodology

  • ­ Vulnerability, threat, and risk analysis

  • ­ Malware detection/intrusion detection

  • ­ Obfuscation and software security

03

AI Cybersecurity

  • ML/DL security and privacy

  • LLM applications in cybersecurity and data protection

  • Privacy-preserving AI models

  • Adversarial attacks and defenses for ML/DL

  • LLM security attacks and defenses

  • Privacy protections for AI applications

06

HCI for Cybersecurity

  • Behavior-based cybersecurity

  • ­Human detection of trusted execution

  • ­ HCI for web technologies

  • ­ HCI for mobile or cloud computing

  • ­ Smart cities

  • ­ Social networks

  • User privacy

  • Cyber Security Application and Technology

  • VR/AR systems

  • Ethical, social, and legal implications of AI and LLMs in cybersecurity

CONTACT US

event.manager AT svcsi.org

SUBSCRIBE FOR ALL SVCC-2026 UPDATES

QUESTIONS? 

LEAVE US A MESSAGE:

Thanks for submitting!

© All Copyrights @ SVCSI

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

bottom of page