posted by user: neeko || 7243 views || tracked by 10 users: [display]

VizSec 2017 : 14th IEEE Symposium on Visualization for Cyber Security

FacebookTwitterLinkedInGoogle


Conference Series : Visualization for Computer Security
 
Link: http://vizsec.org/
 
When Oct 2, 2017 - Oct 2, 2017
Where Phoenix, AZ, USA
Submission Deadline Jul 18, 2017
Notification Due Aug 15, 2017
Final Version Due Sep 12, 2017
Categories    visualization   security   cybersecurity   human factor
 

Call For Papers

*** VizSec 2017 Call for Papers ***

http://vizsec.org/

The 14th IEEE Symposium on Visualization for Cyber Security (VizSec) brings
together researchers and practitioners from academia, government, and industry
to address the needs of the cyber security community through new and
insightful visualization and analysis techniques. VizSec provides an excellent
venue for fostering greater exchange and new collaborations on a broad range
of security- and privacy-related topics. VizSec will be held in
Phoenix, AZ, USA in conjunction with IEEE VIS, on Monday, October 2nd, 2017.

VizSec explores effective and scalable visual interfaces for security domains
such as network security, computer forensics, reverse engineering, insider
threat detection, cryptography, privacy, user assisted attacks prevention,
compliance management, wireless security, secure coding, and
penetration testing.

** Technical Papers **

Full papers describing novel contributions in security visualization are
solicited. Papers may present techniques, applications, theory, analysis,
experiments, or evaluations. We encourage the submission of papers on
technologies and methods that improve cyber security practices, including,
but not limited to:
- Situation awareness and/or understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigations
- Assisting proactive security configuration and deployment
- Reverse engineering and malware analysis
- Vulnerability management
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation and/or user testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security visualizations
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security

When applicable, visualization and interaction techniques that effectively
capture the insights of human analysts and/or allow analysts to collaborate
efficiently are particularly desirable.

Submissions including tests and evaluations of existing tools and techniques
are also considered particularly desirable. If possible, making the data used
for the tests available will also be considered positively. If you do not
have real-world data to demonstrate your visualization, you may be interested
in looking at the VizSec Data Sets page.

** Short Papers **

Short papers describing practical applications of security visualization are
solicited. We encourage the submission of papers discussing the introduction
of cyber security visualizations into operational context, including, but not
limited to:
- Cases where visualization made positive contributions towards meeting
operational needs
- Gaps or negative outcomes from visualization deployments
- Situations where visualization was not utilized, but could have had a
positive impact
- Lessons learned from operational engagements
- Insights gained from the transition process

Cyber security practitioners from industry, as well as the research community,
are encouraged to submit short papers.

** Posters **

Poster submissions may showcase late-breaking results, work in progress,
preliminary results, or visual representations relevant to the VizSec
community. The poster program will be a great opportunity for the authors to
interact with the attendees and solicit feedback. Accepted poster abstracts
will be made available on the VizSec website.

** Submissions **

The VizSec 2017 proceedings will be published by IEEE. Submissions must be
formatted using the IEEE "Conference Style" template that can be found at:

http://junctionpublishing.org/vgtc/Tasks/camera.html

All submissions must be in PDF format. To submit your paper or poster
abstract, login or create an account at:

https://precisionconference.com/~vizsec17

After logging in, click the "new submissions" link on the top navigation
bar and look for the link for "Submit to VizSec 2017" in the list under
the "VIS 2017" heading.

* Papers *

Papers should be at most 8 pages including the bibliography and appendices.
Papers will be peer-reviewed by at least 3 members of the program committee.
Committee members are not required to read the appendices or any pages past
the maximum. Submissions not meeting these guidelines will be rejected
without consideration of their merit.

Reviews are single-blind, so authors may include names and affiliations in
their submissions. Submitted papers must not substantially overlap papers
that have been published or that are simultaneously submitted to a journal
or a conference with proceedings.

The VizSec proceedings will be published by IEEE. Authors of accepted papers
must guarantee that their papers will be presented at the conference.

* Short Papers *

Short papers should be at most 4 pages including the bibliography and
appendices. Short paper submissions will be reviewed by the Paper Chair(s)
and other members of the organizing committee to determine relevance to the
VizSec community.

Accepted short paper authors will have time to present their work at VizSec
during the program.

* Posters *

Extended abstract should be at most 2 pages including the bibliography.
Poster abstracts will be reviewed by the Poster Chair(s) and other members
of the organizing committee to determine relevance to the VizSec community.

Accepted authors must present a corresponding poster during the workshop.
The poster authors can determine the layout by themselves, but the dimensions
of the posters should not exceed the A0 space (841mmx1189mm or 33.1"x46.8").
Additionally, poster authors are requested to give a brief oral preview
during a plenary "fast forward" session.

Accepted poster abstracts will be made available on this website.

** Important Dates **

All deadlines are 5:00 PM PST.

* Papers and Short Papers *

July 18, 2017: Submission for Papers and Short Papers
August 15, 2017: Author Notification for Papers and Short Papers
September 12, 2017: Camera Ready Submission and Copyright Forms for Papers

* Posters *

August 29, 2017: Abstract Submission for Posters
September 9, 2017: Author Notification for Posters

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJSC 2024   International Journal on Soft Computing
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems