[Infovis] Deadline Extended - VizSec 2014, Call for Papers

Nicolas Prigent prigent.nicolas at free.fr
Fri Aug 1 13:39:49 CEST 2014


        11th Visualization for Cyber Security (VizSec) Call for Papers
             ### UPDATE : VizSec Deadline EXTENDED by 1 week! ###


The 11th Visualization for Cyber Security (VizSec) is a forum that brings
together researchers and practitioners from academia, government, and
industry to address the needs of the cyber security community through new and
insightful visualization and analysis techniques. VizSec provides an excellent
venue for fostering greater exchange and new collaborations on a broad range
of security- and privacy-related topics. VizSec will be held in Paris, France
on November 10, 2014 in conjunction with IEEE VIS.

Important research problems often lie at the intersection of disparate
domains. Our focus is to explore effective, scalable visual interfaces for
security domains, where visualization may provide a distinct benefit,
including computer forensics, reverse engineering, insider threat detection,
cryptography, privacy, preventing user assisted attacks, compliance
management, wireless security, secure coding, and penetration testing in
addition to traditional network security. Human time and attention are
precious resources. We are particularly interested in visualization and
interaction techniques that effectively capture the insights of human analysts
so that further processing may be handled by machines, freeing analysts for
other tasks. For example, a malware analyst might use a visualization system
to analyze a new piece of malicious software that facilitates generating a
signature for future machine processing. When appropriate, research that
incorporates multiple data sources, such as network packet captures, firewall
rule sets and logs, DNS logs, web server logs, and/or intrusion detection
system logs, is particularly desirable.

Technical Papers

Full papers describing novel contributions in security visualization are
solicited. Papers may present techniques, applications, practical experience,
theory, analysis, or experiments and evaluations. We encourage the submission
of papers on technologies and methods that promise to improve cyber security
practices, including, but not limited to:

- Situation awareness and/or understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigations
- Reverse engineering and malware analysis
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation and/or user testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security visualizations
  (whether from a security goal perspective or a human factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security

Accepted papers will appear in the ACM Digital Library as part of the ACM
International Conference Proceedings Series.


Poster submissions may showcase late-breaking results, work in progress,
preliminary results, or visual representations relevant to the VizSec
community. The poster program will be a great opportunity for the authors to
interact with the attendees and solicit feedback. Accepted poster abstracts
will be made available on this website.


If you do not have real-world data to demonstrate your visualization, you may
be interested in looking at the VAST 2012 Challenge data. VAST 2013 and VAST
2011 also had cyber security data if you are looking for additional data.



Papers should be at most 8 pages including the bibliography and appendices.
Committee members are not required to read the appendices or any pages past
the maximum. Submissions not meeting these guidelines will be rejected without
consideration of their merit. Submitted papers must not substantially overlap
papers that have been published or that are simultaneously submitted to a
journal or a conference with proceedings. Authors of accepted papers must
guarantee that their papers will be presented at the conference.

The VizSec proceedings will be published by ACM. The ACM SIG Proceedings
Templates provides Word and LaTeX templates. (If you are using LaTeX, please
use Option 2: LaTeX2e - Tighter Alternate style.)

Authors should apply ACM Computing Classification categories and terms.

ACM invites authors to submit an image representation of their article. The
image must be selected from the article body and can be any of the following:
art, graphic, table, figures, etc. (Image files are to be as square as
possible, 100x100 ppi and in jpg format.) Authors must supply a caption with
the image. The caption length should be no more than 512 characters.


Interested authors should submit an extended abstract as PDF of at most 2
pages including figures and references. Accepted abstracts will be made
available on this website. Authors must present a corresponding poster during
the workshop. The poster authors can determine the layout by themselves, but
the dimensions of the posters should not exceed the A0 space (841mm x 1189mm
or 33.1" x 46.8"). Additionally, poster authors are requested to give a brief
oral preview during a plenary "fast forward" session.


Submit papers and poster abstracts using EasyChair:

Important Dates

All deadlines are 5:00 PM PST


August 8, 2014
    Submission for Papers
September 12, 2014
    Author Notification for Papers
October 03, 2014
    Camera Ready Submission and Copyright Forms for Papers


September 19, 2014
    Abstract Submission for Posters
September 26, 2014
    Author Notification for Poster

More information about the Infovis mailing list