[Infovis] LAST CALL: Extended VizSec Deadline **July 22**

VizSec 2013 sjengle at cs.usfca.edu
Fri Jul 19 17:42:40 CEST 2013


**NOTE: PAPER DEADLINE EXTENDED TO JULY 22**

VIZSEC 2013
=======================================

VizSec will be held in Atlanta GA, USA on October 14, 2013. VizSec brings  
together researchers and practitioners in information visualization and  
security to address the specific needs of the cyber security community  
through new and insightful visualization techniques.

VizSec will be held as a workshop at IEEE VIS.

The proceedings will be in the ACM Digital Library. Proceedings will be  
publicly available for one week prior to the event.

Call for Papers
=======================================

The 10th Visualization for Cyber Security (VizSec) is a forum that brings  
together researchers and practitioners from academia, government, and  
industry to address the needs of the cyber security community through new  
and insightful visualization and analysis techniques. VizSec will provide  
an excellent venue for fostering greater exchange and new collaborations on  
a broad range of security- and privacy-related topics. Accepted papers will  
appear in the ACM Digital Library as part of the ACM International  
Conference Proceedings Series.

Important research problems often lie at the intersection of disparate  
domains. Our focus is to explore effective, scalable visual interfaces for  
security domains, where visualization may provide a distinct benefit,  
including computer forensics, reverse engineering, insider threat  
detection, cryptography, privacy, preventing 'user assisted' attacks,  
compliance management, wireless security, secure coding, and penetration  
testing in addition to traditional network security. Human time and  
attention are precious resources. We are particularly interested in  
visualization and interaction techniques that effectively capture human  
analyst insights so that further processing may be handled by machines,  
freeing the analyst for other tasks. For example, a malware analyst might  
use a visualization system to analyze a new piece of malicious software and  
then facilitate generating a signature for future machine processing. When  
appropriate, research that incorporates multiple data sources, such as  
network packet captures, firewall rule sets and logs, DNS logs, web server  
logs, and/or intrusion detection system logs, is particularly desirable.

Technical Papers
---------------------------------------

Full papers offering novel contributions in security visualization are  
solicited. Papers may present techniques, applications, practical  
experience, theory, analysis, or experiments and evaluations. We encourage  
papers on technologies and methods that promise to improve cyber security  
practices, including, but not limited to:

- Situational awareness / understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigation
- Reverse engineering and malware analysis
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation / User testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security visualizations  
(whether from a security goal perspective or a human factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security
- Cyber intelligence
- Human factors in cyber security

Posters
---------------------------------------

Poster submissions may showcase late-breaking results, work in progress,  
preliminary results, or visual representations relevant to the VizSec  
community. Accepted poster abstracts will be made available on this website.

Awards
---------------------------------------

There will be an award for the best paper from the accepted program. The  
best paper award will be given to the paper judged to have the highest  
overall quality. A key element of the best paper selection process will be  
whether the results are believed to be repeatable by other scientists based  
on the algorithms and data provided in the paper. This award will be chosen  
by the program committee.

Data
---------------------------------------

If you do not have real-world data to demonstrate your visualization, you  
may be interested in looking at the VAST 2012 Challenge data. VAST 2011  
also had cyber security data if you are looking for additional data.

Submissions
=======================================

Papers
---------------------------------------

Papers should be at most 8 pages including the bibliography and appendices.  
Committee members are not required to read the appendices or any pages past  
the maximum. Submissions not meeting these guidelines will be rejected  
without consideration of their merits. Submitted papers must not  
substantially overlap papers that have been published or that are  
simultaneously submitted to a journal or a conference with proceedings.  
Authors of accepted papers must guarantee that their papers will be  
presented at the conference, preferably by themselves or by prior  
arrangement through a delegate.

Posters
---------------------------------------

Poster submissions consist of an extended abstract of at most 2 pages  
including figures and references. Authors must present a corresponding  
poster during the designated poster session. Poster authors have the  
opportunity to give a brief oral preview during a plenary "fast forward"  
session.

Paper Formatting
---------------------------------------

The VizSec proceedings will be published by ACM. The ACM SIG Proceedings  
Templates provides Word and LaTeX templates. (If you are using LaTeX,  
please use Option 2: LaTeX2e - Tighter Alternate style.)

Authors should apply ACM Computing Classification categories and terms. ACM  
invites authors to submit an image representation of their article. The  
image must be selected from the article body and can be any of the  
following: art, graphic, table, figures, etc. (Image files are to be as  
square as possible, 100x100 ppi and in jpg format.) Authors must supply a  
caption with the image. The caption length should be no more than 512  
characters.

Submission
---------------------------------------

Submit papers and poster abstracts using EasyChair:  
<http://www.easychair.org/conferences/?conf=vizsec2013>

Important Dates (Updated)
=======================================

Papers
---------------------------------------

*All deadlines are 5:00 PM EDT.*

Jul 22 2013: Submission for Papers *(EXTENDED)*
Aug 23 2013: Author Notification for Papers
Sep 06 2013: Camera Ready Submission and Copyright Forms for Papers
Oct 08 2013: Papers Available in ACM Digital Library

Posters
---------------------------------------

Aug 23 2013: Abstract Submission for Posters
Sep 01 2013: Author Notification for Posters

Hotel and Venue
---------------------------------------

The conference will be located at the downtown Marriott Marquis Hotel. The  
Atlanta Marriott Marquis, 3rd largest Marriott in the world, rises 50  
stories and contains 1,569 rooms and 94 suites. For more information see  
the IEEE VIS venue information page, hotel information page, and travel  
information page.

Committee
=======================================

**General Chair**
John Goodall, Oak Ridge National Laboratory

**Program Chair**
Kwan-Liu Ma, University of California, Davis

**Publications / Publicity Chair**
Sophie Engle, University of San Francisco

**Poster Chair**
Fabian Fischer, University of Konstanz

Program Committee
---------------------------------------

- David Barrera, Carleton University
- Daniel Best, Pacific Northwest National Laboratory
- Greg Conti, US Military Academy at West Point
- Gustavo de los Reyes, AT&T
- Ron Dilley, UberAdmin
- David Ebert, Purdue University
- Alex Endert, Pacific Northwest National Laboratory
- Rob Erbacher, Army Research Laboratory
- Carrie Gates, CA Technologies
- John Gerth, Stanford University
- T. J. Jankun-Kelly, Mississippi State University
- Lane Harrison, University of North Carolina, Charlotte
- Jörn Kohlhammer, Fraunhofer IGD
- Raffael Marty, PixlCloud
- Chris Muelder, University of California, Davis
- Stephen North, AT&T
- Joe Parry, Cambridge Intelligence
- Celeste Lyn Paul, Department of Defense
- Teryl Taylor, University of North Carolina
- Olivier Thonnard, Symantec
- Joanne Treurniet, Defence Research and Development Canada
- Anatoly Yelizarov, Lomonosov Moscow State University
- Tamara Yu, MIT Lincoln Laboratory

Contact
=======================================

See <http://www.vizsec.org> for more information. Email questions to  
<vizsec2013 at easychair.org> or post to the Google Group  
<https://groups.google.com/forum/#!forum/vizsec>.



More information about the Infovis mailing list

This site is generously hosted by Macrofocus GmbH, developer of TreeMap and other fine visualization tools