ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

VizSec 2015 - 12th IEEE Symposium on Visualization for Cyber Security

Date2015-10-26

Deadline2015-08-01

VenueChicago, Illinois, USA - United States USA - United States

Keywords

Websitehttp://vizsec.org

Topics/Call fo Papers

The 12th IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec will be held in Chicago, Illinois, USA in conjunction with IEEE VIS.
The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing.
Technical Papers
Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:
Situation awareness and/or understanding
Incident handling including triage, exploration, correlation, and response
Computer forensics
Recording and reporting results of investigations
Assisting proactive security configuration and deployment
Reverse engineering and malware analysis
Vulnerability management
Multiple data source analysis
Analyzing information requirements for computer network defense
Evaluation and/or user testing of VizSec systems
Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)
Modeling system and network behavior
Modeling attacker and defender behavior
Studying risk and impact of cyber attacks
Predicting future attacks or targets
Security metrics and education
Software security
Mobile application security
Social networking privacy and security
When applicable, visualization and interaction techniques that effectively capture the insights of human analysts and/or allow analysts to collaborate efficiently are particularly desirable.

Last modified: 2015-06-15 23:05:20