posted by user: shubh0894 || 532 views || tracked by 1 users: [display]

SVCC 2020 : Silicon Valley Cybersecurity Conference 2020


When Dec 17, 2020 - Dec 19, 2020
Where Virtual
Submission Deadline Nov 21, 2020
Notification Due Dec 5, 2020

Call For Papers

The annual Silicon Valley Cybersecurity Conference (SVCC) focuses on research in dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems. This conference is a forum to present research in robustness and resilience in a wide spectrum of computing systems and networks. All aspects of the research and practice of applied security are within the scope of this conference. Relevant topics include innovative system design, protocols, and algorithms for detecting and responding to malicious threats in dependable and secure systems and networks including experimentation and assessment.

Topics of Interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare with multiple tracks for each.

Authors are invited to submit original papers on the current areas of emphasis, but not limited to:

Network Security Track:
- ML/DL techniques for Internet-of-Things, wireless networks, and open networking
- Software-defined networking and network function virtualization
- Edge-computing security and privacy
- Attack detection and prevention
- Anonymous communications
- Cryptography for network security
- Identity management
- Firewall technologies
- Formal trust models and security modeling
- Mobile and wireless network security
- Internet-of-Things security and privacy

 Blockchain Security Track
- Distributed Ledger Technologies (DLT)
- Security and privacy in decentralized applications (dAPPs)/DLT/Blockchain
- Comparing proof-of-work vs. proof-of-stake blockchains
- Attacks on blockchains: double-spending, selfish mining, re-entrance attack
- Blockchain Theory and algorithm
- Smart Contract Theory
- Consensus protocols for dApps
- Infrastructures for dApps
- Communication protocols and standards for dApps
- Decentralized Identity
- Identity Management for dApps

System and Hardware Security Track:
- Security primitives in system architecture and systems
- Side-channel attacks and mitigation
- Smartphones and smart devices
- Firmware security in Internet-of-things
- Cyberattacks in systems
- Trusted execution environments
- Anti-counterfeit, anti-tamper
- SoC platform security
- Reconfigurable fabric security

Software Security Track:
- Secure software design/architecture
- Secure software practices
- Security requirements engineering
- Security analysis tools and methods
- Security evaluation criteria and methodology
- Security education and training
- Vulnerability, threat, and risk analysis
- Malware detection/intrusion detection
- Obfuscation and software security
- Usability of secure/security software
- Security awareness for software developers

Important Date
* November. 21, 2020 at Midnight (PDT): Paper submission deadline (Hard Deadline due to the tight schedule. We encourage you to submit your paper in advance. We will review your paper immediately.)

* December 5, 2020: Author notification

Paper submission
The conference solicits research papers describing novel and previously unpublished scientific contributions to the field of cybersecurity in diverse areas. The authors need to submit your original paper to EasyChair.

Two different types of papers can be submitted:
* Regular papers (7-8 pages IEEE double-column conference proceeding
* Short papers (4-5 pages IEEE double-column conference proceeding format)

Regular papers should describe novel and previously unpublished scientific contributions to the field of cybersecurity. Each regular paper is limited to 7-8 pages, including tables, figures, and references.

Short papers aim at presenting novel work in progress, novel applications, and novel industry perspective. Each short paper is limited to 4-5pages, including tables, figures, and references. Short papers will also be peer-reviewed, however, they will be evaluated with a focus on the potential for establishing new ideas and for sparking the interest of participants.

All papers must be written in English. Authors can purchase extra pages up to 2 pages. Manuscripts must include a title, an abstract with 200-250 words, and a list of 4-6 keywords. All papers must be prepared in the IEEE double-column proceedings format. SVCSI 2020 uses a double-blind review policy. Authors are required to remove their names, affiliation(s), and other identifying information from the header of the manuscript. This also includes meta-data in the submitted document as well as acknowledgment sections. Papers that do not meet these anonymization requirements
may be rejected without further review.

Authors are encouraged, but not required, to cite their previous work in a neutral manner, for example, avoid “in our previous work [3]” and instead use “as shown in [3]”.

All submitted papers will be peer-reviewed. The name(s) of the author(s) will not be visible to the reviewers of a paper. The name(s) of the author(s) will be visible in the submission system to the Program Committee Chairs. The authors should report any conflict of interest with the list of Program Committee members during the submission of the manuscript, in which case the Program Committee Chairs will exclude the corresponding PC member(s) from reviewing the paper.

Paper publication
All accepted full papers will be published by an open article system and special issues with the current following journals. We will add more special issues soon. If the journal reviewers are satisfied with the revisions made to address the weaknesses identified during the initial review process at this conference, this category of papers will be
published in the special issue. Special issue “Building Trustworthy and dependable Infrastructure for in Internet of Things” in Journal of MDPI Sensor (impact factor: 3.275)

All the accepted original papers as for preprint will be available through our SVCSI website as a digital book with an ISBN number. We can also invite accepted short papers if the authors can extend their manuscripts to be suitable for the special issue through a full review process. We will ask the authors to improve their accepted papers within two and a half months after finishing the conference. 

Each accepted paper for this conference is required to be registered by one of its authors, and at least one author is required to attend and present the paper for 25 minutes including Q&A online at the conference for the paper to be included in the final technical program and the Digital Library. Journal publications require extra publication fees according to the journal publisher policy. 

Program Chairs
Divyesh Jadav, IBM Research
Younghee Park, San Jose State University

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
C3AI 2024   The International Conference on Computing, Communication, Cybersecurity & AI
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
Ei/Scopus-ACCMI 2024   2024 2nd Asia Conference on Automation, Cloud Computing and Machine Intelligence (ACCMI 2024)
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
CCCI 2024   2024 International Conference on Communications, Computing, Cybersecurity, and Informatics
i-Society 2024   The 17th International Conference on Information Society
NordSec 2024   The 29th Nordic Conference on Secure IT systems (NordSec) 2024
HICSS AI4Cyber and Cyber4AI 2025   HICSS 58 Mini-Track: Collaborative AI, LLMs, & Cybersecurity - Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI
MLCS 2024   6th Workshop on Machine Learning for CyberSecurity