VizSec 2013 - 2013 International Symposium on Visualization for Cyber Security
Date2013-12-07 - 2013-12-11
Deadline2013-07-08
VenueAtlanta , USA - United States
Keywords
Websitehttps://www.vizsec.org/
Topics/Call fo Papers
The 10th International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec will provide an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.
Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.
Technical Papers
Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:
Situational awareness / understanding
Incident handling including triage, exploration, correlation, and response
Computer forensics
Recording and reporting results of investigation
Reverse engineering and malware analysis
Multiple data source analysis
Analyzing information requirements for computer network defense
Evaluation / User testing of VizSec systems
Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)
Modeling system and network behavior
Modeling attacker and defender behavior
Studying risk and impact of cyber attacks
Predicting future attacks or targets
Security metrics and education
Software security
Mobile application security
Social networking privacy and security
Posters
Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. Accepted poster abstracts will be made available on this website.
Awards
There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.
Data
If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VAST 2012 Challenge data. VAST 2011 also had cyber security data if you are looking for additional data.
Submissions
Papers
Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.
Posters
Poster submissions consist of an extended abstract of at most 2 pages including figures and references. Authors must present a corresponding poster during the designated poster session. Poster authors have the opportunity to give a brief oral preview during a plenary "fast forward" session.
Paper Formatting
The VizSec proceedings will be published by ACM. The ACM SIG Proceedings Templates provides Word and LaTeX templates. (If you are using LaTeX, please use Option 2: LaTeX2e - Tighter Alternate style.)
Authors should apply ACM Computing Classification categories and terms. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.
Submission
Submit papers and poster abstracts using EasyChair: http://www.easychair.org/conferences/?conf=vizsec2...
Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.
Technical Papers
Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:
Situational awareness / understanding
Incident handling including triage, exploration, correlation, and response
Computer forensics
Recording and reporting results of investigation
Reverse engineering and malware analysis
Multiple data source analysis
Analyzing information requirements for computer network defense
Evaluation / User testing of VizSec systems
Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)
Modeling system and network behavior
Modeling attacker and defender behavior
Studying risk and impact of cyber attacks
Predicting future attacks or targets
Security metrics and education
Software security
Mobile application security
Social networking privacy and security
Posters
Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. Accepted poster abstracts will be made available on this website.
Awards
There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.
Data
If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VAST 2012 Challenge data. VAST 2011 also had cyber security data if you are looking for additional data.
Submissions
Papers
Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.
Posters
Poster submissions consist of an extended abstract of at most 2 pages including figures and references. Authors must present a corresponding poster during the designated poster session. Poster authors have the opportunity to give a brief oral preview during a plenary "fast forward" session.
Paper Formatting
The VizSec proceedings will be published by ACM. The ACM SIG Proceedings Templates provides Word and LaTeX templates. (If you are using LaTeX, please use Option 2: LaTeX2e - Tighter Alternate style.)
Authors should apply ACM Computing Classification categories and terms. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.
Submission
Submit papers and poster abstracts using EasyChair: http://www.easychair.org/conferences/?conf=vizsec2...
Other CFPs
- The 46th Annual IEEE/ACM International Symposium on Microarchitecture
- Naked Element presents the first Mobile Development Conference
- Going Global - Research and Learning Conference 2013
- 2013 International Conference on Biologically Inspired Cognitive Architectures
- 2013 International Conference on Microtechnology and MEMS (ICMM 2013)
Last modified: 2013-02-25 22:18:48