![]() |
| |||||||||||||||
SaTC 2026 : 2nd IEEE Conference on Secure and Trustworthy CyberInfrastructure for IoT and Microelectronics (SaTC 2026) | |||||||||||||||
Link: https://www.satcconf.com/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
2nd IEEE Conference on Secure and Trustworthy CyberInfrastructure for IoT and Microelectronics
March 24–26, 2026 Houston, Texas. We invite you to the 2nd IEEE Conference on Secure and Trustworthy CyberInfrastructure for IoT and Microelectronics (SaTC 2025), scheduled to take place from March 24-26, 2026. Will be held at Houston, Texas, it provides a unique platform to discuss the recent advancements in security and assurance challenges in IoT/Edge computing, communication systems, and embedded computing. We plan to submit the conference proceedings for publication to IEEE Xplore. Topic Of Interest: All accepted papers will undergo a rigorous peer-review process and, upon meeting the necessary quality and relevance standards, will be submitted for inclusion in IEEE Xplore. We look forward to your participation and the exciting discussions that will emerge at SATC. Together, we can advance the security, privacy, and assurance of the transformative technologies shaping the future. -) Track 1: • Secure Microelectronics for IoT Devices • Secure IoT Device Supply Chains • Trusted Computing for IoT Applications • Secure Embedded AI Systems • Secure and Assured 3D/Additive Manufacturing for IoT Systems • Hardware Root of Trust and TamperResistance in IoT • Secure Boot and Firmware Integrity -) Track 2: • IoT Hardware Security and Trust • Security and Assurance in Heterogeneous System Integration • Secure Hardware Accelerators for IoT • Supply Chain Integrity Verification for Embedded Systems • Side-Channel Analysis and Countermeasures • Physical Unclonable Functions (PUFs) for IoT Identity Track 3: • Edge Computing Security Techniques • Secure IoT-based Distributed Systems, Edge, and Cloud Computing • IoT-Based Distributed Systems Security • Digital Twin Security for IoT Systems • Advanced IoT Security Frameworks • Blockchain for Secure Distributed IoT Systems • Blockchain-enabled Trust and Data Integrity in Cloud-Edge Architectures -) Track 4: • IoT Network/Communication Security and Privacy • Secure IoT Communication Protocols • Blockchain for IoT Device Authentication • Smart Contract Security in IoT • Quantum-Safe Cryptography for IoT • Zero Trust Architecture in IoT Networks • 5G and IoT Security • IoT Privacy Enhancing Technologies • Secure and Green Communication for IoT Systems -)Track 5: • Trustworthy Machine Learning for IoT • AI-driven Threat Detection for IoT • Deep Learning for IoT Anomaly Detection • Secure Generative AI for Predictive Modeling in IoT • AI-based Fraud Detection Systems • Trusted ML and Embedded AI Hardware • AI for Secure Decision-Making in IoT • Adversarial Attacks and Data Poisoning Defenses in IoT AI/ML • Model Robustness and Resilience in IoT AI/ML Systems • Privacy-Preserving Machine Learning in IoT -)Track 6: • Security and Privacy in AI-driven Smart City Applications • Securing AI-based Healthcare Systems and Data • Safety, Security, and Validation of AI in Autonomous Vehicles • Resilience of AI-Driven Control Systems for Critical Infrastructure • Secure Manufacturing and Supply Chain Assurance CONTACT US: Email: info@satcconf.com Website: https://www.satcconf.com/ |
|