[Infovis] VizSec 2008 Call for Papers

John Goodall johng at securedecisions.avi.com
Thu Apr 10 21:25:14 CEST 2008


The full and short paper deadline for VizSec has been extended. Proceedings
will be published by Springer's Lecture Notes in Computer Science. The
Keynote speaker at VizSec will be Ben Shneiderman, speaking on the topic
Information Forensics: Harnessing visualization to support discovery.


VizSEC 2008 Workshop on Visualization for Cyber Security
http://vizsec.org/workshop2008/
September 15, 2008   /   Cambridge, MA USA
In conjunction with RAID 2008


The 5th International Workshop on Visualization for Cyber Security will
provide a forum for new research in visualization for computer security. We
are pleased to be holding this year's meeting in conjunction with the 11th
International Symposium on Recent Advances in Intrusion Detection. The
VizSec Workshop will be held at MIT in Cambridge, Massachusetts USA on
Monday, September 15, 2008. The Keynote this year will be given by Ben
Shneiderman on the topic Information Forensics: Harnessing visualization to
support discovery

As a result of previous VizSec workshops, we have seen both the application
of existing visualization techniques to security problems and the
development of novel security visualization approaches. However, VizSec
research has focused on helping human analysts to detect anomalies and
patterns, particularly in computer network defense. Other communities, led
by researchers from the RAID Symposia, have researched automated methods for
detecting anomalies and malicious activity.

The theme for this year's workshop, which will be held in conjunction with
RAID 2008, will be on bridging the gap between visualization and automation,
such as leveraging the power of visualization to create rules for intrusion
detection and defense systems. We encourage VizSec participants to stay for
the RAID Symposium and RAID participants to come a day early to participate
in VizSec. There will be a discount for joint registration.

We also solicit papers that report results on visualization techniques and
systems in solving all aspects of cyber security problems, including:

    * Visualization of Internet routing
    * Visualization of packet traces and network flows
    * Visualization of intrusion detection alerts
    * Visualization of attack tracks
    * Visualization of security vulnerabilities
    * Visualization of attack paths
    * Visualization of application processes
    * Visualization for forensic analysis
    * Visualization for correlating events
    * Visualization for computer network defense training
    * Visualization for offensive information operations
    * Visualization for building rules
    * Visualization for feature selection
    * Visualization for detecting anomalous activity
    * Deployment and field testing of VizSec systems
    * Evaluation and user testing of VizSec systems
    * User and design requirements for VizSec systems
    * Lessons learned from development and deployment of VizSec systems

All submitted papers will be peer-reviewed. Full and short papers will be
published by Springer Lecture Notes in Computer Science (LNCS) in the VizSec
2008 Proceedings. Poster and Demo abstracts will be made available on the
VizSec web site.

Submissions should list all authors and their affiliations; in case of
multiple authors, the contact author must be indicated (anonymized
submissions are not required). For accepted papers, at least one of the
authors must attend the conference to present the work. Submissions must be
in PDF format. All submissions should include an abstract, keywords,
references, and high resolution, color images.

Submissions must not substantially duplicate work that any of the authors
has published elsewhere or has submitted in parallel to a journal or to any
other conference or workshop with proceedings. Simultaneous submission of
the same work to multiple venues, submission of previously published work,
and plagiarism constitute dishonesty or fraud. VizSec, like other scientific
and technical conferences and journals, prohibits these practices and may,
on the recommendation of the program chair, take action against authors who
have committed them. Further questions on the submission process may be sent
to the program chair.

Deadlines
April 21, 2008 : Deadline for full paper submission
May 19, 2008 : Deadline for short paper submissions
July 18, 2008 : Deadline for poster and demo abstracts

Full Papers
Full papers should present mature research results. Accepted papers will be
presented and included in the VizSec 2008 proceedings. Papers must include
an abstract and a list of keywords and can be up to 18 pages in total
length, including the bibliography and appendices.

Short Papers
Short papers can be used to present less mature research results than full
papers, or late-breaking results. Accepted short papers will be presented
and included in the VizSec 2008 proceedings. Short papers must include an
abstract and a list of keywords and can be up to 8 pages in total length,
including the bibliography and appendices.

Posters
Posters can be used to describe work in progress or updates to previously
published VizSec research or R&D. Poster submissions should consist of a 2
page abstract. Poster will be presented at the VizSec/RAID reception.
Abstracts will be made available on the web site.

Demos
Demonstrations can be used to show new or updated development efforts. Demo
submissions should consist of a 2 page abstract. Demonstrations will take
place at the VizSec/RAID reception. (You will need to bring a laptop for
demos.) Abstracts will be made available on the web site.


Formatting Instructions
All accepted, camera-ready manuscripts must be submitted using the LaTeX2e
(strongly preferred) or Word templates provided by Springer for LNCS
'Proceedings and Other Multiauthor Volumes.'
    http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0

Submission Instructions
Please submit PDF papers using the EasyChair workshop site:
    http://www.easychair.org/conferences/?conf=vizSEC08


VizSec 2008 is sponsored by:
NSA's National Information Assurance Research Laboratory (NIARL)
Microsoft
CA Labs
Applied Visions


http://vizsec.org/workshop2008/


-- 
john goodall, phd . JohnG at SecureDecisions.avi.com
518.248.8195  (mobile)  .  631.754.4920  (office)
Secure Decisions division of Applied Visions Inc.
http://securedecisions.com   .  http://vizsec.org



More information about the Infovis mailing list

This site is generously hosted by Macrofocus GmbH, developer of TreeMap and other fine visualization tools