The full and short paper deadline for VizSec has been extended. Proceedings will be published by Springer's Lecture Notes in Computer Science. The Keynote speaker at VizSec will be Ben Shneiderman, speaking on the topic Information Forensics: Harnessing visualization to support discovery. VizSEC 2008 Workshop on Visualization for Cyber Security http://vizsec.org/workshop2008/ September 15, 2008 / Cambridge, MA USA In conjunction with RAID 2008 The 5th International Workshop on Visualization for Cyber Security will provide a forum for new research in visualization for computer security. We are pleased to be holding this year's meeting in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection. The VizSec Workshop will be held at MIT in Cambridge, Massachusetts USA on Monday, September 15, 2008. The Keynote this year will be given by Ben Shneiderman on the topic Information Forensics: Harnessing visualization to support discovery As a result of previous VizSec workshops, we have seen both the application of existing visualization techniques to security problems and the development of novel security visualization approaches. However, VizSec research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. Other communities, led by researchers from the RAID Symposia, have researched automated methods for detecting anomalies and malicious activity. The theme for this year's workshop, which will be held in conjunction with RAID 2008, will be on bridging the gap between visualization and automation, such as leveraging the power of visualization to create rules for intrusion detection and defense systems. We encourage VizSec participants to stay for the RAID Symposium and RAID participants to come a day early to participate in VizSec. There will be a discount for joint registration. We also solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including: * Visualization of Internet routing * Visualization of packet traces and network flows * Visualization of intrusion detection alerts * Visualization of attack tracks * Visualization of security vulnerabilities * Visualization of attack paths * Visualization of application processes * Visualization for forensic analysis * Visualization for correlating events * Visualization for computer network defense training * Visualization for offensive information operations * Visualization for building rules * Visualization for feature selection * Visualization for detecting anomalous activity * Deployment and field testing of VizSec systems * Evaluation and user testing of VizSec systems * User and design requirements for VizSec systems * Lessons learned from development and deployment of VizSec systems All submitted papers will be peer-reviewed. Full and short papers will be published by Springer Lecture Notes in Computer Science (LNCS) in the VizSec 2008 Proceedings. Poster and Demo abstracts will be made available on the VizSec web site. Submissions should list all authors and their affiliations; in case of multiple authors, the contact author must be indicated (anonymized submissions are not required). For accepted papers, at least one of the authors must attend the conference to present the work. Submissions must be in PDF format. All submissions should include an abstract, keywords, references, and high resolution, color images. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. VizSec, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. Further questions on the submission process may be sent to the program chair. Deadlines April 21, 2008 : Deadline for full paper submission May 19, 2008 : Deadline for short paper submissions July 18, 2008 : Deadline for poster and demo abstracts Full Papers Full papers should present mature research results. Accepted papers will be presented and included in the VizSec 2008 proceedings. Papers must include an abstract and a list of keywords and can be up to 18 pages in total length, including the bibliography and appendices. Short Papers Short papers can be used to present less mature research results than full papers, or late-breaking results. Accepted short papers will be presented and included in the VizSec 2008 proceedings. Short papers must include an abstract and a list of keywords and can be up to 8 pages in total length, including the bibliography and appendices. Posters Posters can be used to describe work in progress or updates to previously published VizSec research or R&D. Poster submissions should consist of a 2 page abstract. Poster will be presented at the VizSec/RAID reception. Abstracts will be made available on the web site. Demos Demonstrations can be used to show new or updated development efforts. Demo submissions should consist of a 2 page abstract. Demonstrations will take place at the VizSec/RAID reception. (You will need to bring a laptop for demos.) Abstracts will be made available on the web site. Formatting Instructions All accepted, camera-ready manuscripts must be submitted using the LaTeX2e (strongly preferred) or Word templates provided by Springer for LNCS 'Proceedings and Other Multiauthor Volumes.' http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0 Submission Instructions Please submit PDF papers using the EasyChair workshop site: http://www.easychair.org/conferences/?conf=vizSEC08 VizSec 2008 is sponsored by: NSA's National Information Assurance Research Laboratory (NIARL) Microsoft CA Labs Applied Visions http://vizsec.org/workshop2008/ -- john goodall, phd . JohnG at SecureDecisions.avi.com 518.248.8195 (mobile) . 631.754.4920 (office) Secure Decisions division of Applied Visions Inc. http://securedecisions.com . http://vizsec.org
This site is generously hosted by Macrofocus GmbH, developer of TreeMap and other fine visualization tools