posted by user: lmcoote || 2328 views || tracked by 8 users: [display]

ISI Special Topic 2013 : Evaluating Security Visualizations in Supporting Analytical Reasoning & Decision Making in Cybersecurity

FacebookTwitterLinkedInGoogle

Link: http://www.isiconference2013.org/pgs/workshop-on-cybersecurity-visualizations.php
 
When Jun 4, 2013 - Jun 4, 2013
Where Seattle, Washington
Submission Deadline Mar 31, 2013
Notification Due Apr 12, 2013
Final Version Due Apr 29, 2013
Categories    visualization   cybersecurity   evaluation   perception
 

Call For Papers

Workshop Description
As the potential for visualizations in cybersecurity analysis becomes exceedingly more apparent, efforts to evaluate these visualizations become more imperative than ever to supporting the cybersecurity mission. As technology and big data continue to grow rampantly so does the deployment of insufficiently evaluated cybersecurity visualizations that claim to be most aligned with how analysts think and perceive data. Before organizations may intelligently incorporate visualization into their cybersecurity analysis process they must be prepared to pose tailored sets of questions that directly relate to the particular objective of the cyber analyst. This workshop addresses these gaps with the intent of bringing together experts from a variety of disciplines relevant to the topic of evaluating cybersecurity visualizations in their ability to support analytic reasoning and decision making in cybersecurity.

Paper Topics
We welcome paper submissions on the following or related topics:

Empowering the Human Analysts
Methods and techniques for evaluating the impact cybersecurity visualizations have on enabling the human perception and cognitive processes that are required for intelligent decision making.

Addressing current deficiencies in cybersecurity analysis
Methods and techniques for measuring the impact cybersecurity visualization tools have on addressing current deficiencies that still exist in cybersecurity analysis such as exploration and prediction.

The Unique nature of Cybersecurity Visualization
Identifying aspects that are specific to cybersecurity visualization, and identifying relevant contributions from current research in the broader fields of information visualization and scientific visualization, and from visualizations in other domains.

Paper Submission:
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) can be found on IEEE's Publications web pages. Submissions can be long (6,000 words, 6 pages max) or short (3000 words, 3 pages max). Papers in English must be submitted by email to Lisa Coote at Lisa.Coote@innovative-analytics.com. The accepted workshop papers from will be published by the IEEE Press in formal Proceedings. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in the conference proceedings.

Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics Journal.
Organizing Committee:

Kevin O'Connell, Innovative Analytics & Training
Lisa Coote, Innovative Analytics & Training


Program Committee:

Raffael Marty, PixlCloud
Tomos Budavari, Johns Hopkins University
Antonio Sanfilippo, Pacific Northwest National Laboratory
John T. Langton, VisiTrend LLC
Claudio Silva, NYU Polytechnic
Bernice Rogowitz, Visual Perspectives Consulting
Cullen Jackson, APTIMA
Enrico Bertini, NYU Polytechnic
John Goodall, Oak Ride National Laboratory
Christopher Healey, North Carolina State University

Related Resources

IEEE ISI 2020   IEEE Intelligence and Security Informatics (ISI)
Signal 2021   8th International Conference on Signal and Image Processing
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [Second Round: 11 December 2020]
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
EI-CMVIT 2021   5th International Conference on Machine Vision and Information Technology (CMVIT 2021)
CCNC 2021   IEEE Consumer Communications & Networking Conference
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics