posted by user: neeko || 6284 views || tracked by 10 users: [display]

VizSec 2017 : 14th IEEE Symposium on Visualization for Cyber Security


Conference Series : Visualization for Computer Security
When Oct 2, 2017 - Oct 2, 2017
Where Phoenix, AZ, USA
Submission Deadline Jul 18, 2017
Notification Due Aug 15, 2017
Final Version Due Sep 12, 2017
Categories    visualization   security   cybersecurity   human factor

Call For Papers

*** VizSec 2017 Call for Papers ***

The 14th IEEE Symposium on Visualization for Cyber Security (VizSec) brings
together researchers and practitioners from academia, government, and industry
to address the needs of the cyber security community through new and
insightful visualization and analysis techniques. VizSec provides an excellent
venue for fostering greater exchange and new collaborations on a broad range
of security- and privacy-related topics. VizSec will be held in
Phoenix, AZ, USA in conjunction with IEEE VIS, on Monday, October 2nd, 2017.

VizSec explores effective and scalable visual interfaces for security domains
such as network security, computer forensics, reverse engineering, insider
threat detection, cryptography, privacy, user assisted attacks prevention,
compliance management, wireless security, secure coding, and
penetration testing.

** Technical Papers **

Full papers describing novel contributions in security visualization are
solicited. Papers may present techniques, applications, theory, analysis,
experiments, or evaluations. We encourage the submission of papers on
technologies and methods that improve cyber security practices, including,
but not limited to:
- Situation awareness and/or understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigations
- Assisting proactive security configuration and deployment
- Reverse engineering and malware analysis
- Vulnerability management
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation and/or user testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security visualizations
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security

When applicable, visualization and interaction techniques that effectively
capture the insights of human analysts and/or allow analysts to collaborate
efficiently are particularly desirable.

Submissions including tests and evaluations of existing tools and techniques
are also considered particularly desirable. If possible, making the data used
for the tests available will also be considered positively. If you do not
have real-world data to demonstrate your visualization, you may be interested
in looking at the VizSec Data Sets page.

** Short Papers **

Short papers describing practical applications of security visualization are
solicited. We encourage the submission of papers discussing the introduction
of cyber security visualizations into operational context, including, but not
limited to:
- Cases where visualization made positive contributions towards meeting
operational needs
- Gaps or negative outcomes from visualization deployments
- Situations where visualization was not utilized, but could have had a
positive impact
- Lessons learned from operational engagements
- Insights gained from the transition process

Cyber security practitioners from industry, as well as the research community,
are encouraged to submit short papers.

** Posters **

Poster submissions may showcase late-breaking results, work in progress,
preliminary results, or visual representations relevant to the VizSec
community. The poster program will be a great opportunity for the authors to
interact with the attendees and solicit feedback. Accepted poster abstracts
will be made available on the VizSec website.

** Submissions **

The VizSec 2017 proceedings will be published by IEEE. Submissions must be
formatted using the IEEE "Conference Style" template that can be found at:

All submissions must be in PDF format. To submit your paper or poster
abstract, login or create an account at:

After logging in, click the "new submissions" link on the top navigation
bar and look for the link for "Submit to VizSec 2017" in the list under
the "VIS 2017" heading.

* Papers *

Papers should be at most 8 pages including the bibliography and appendices.
Papers will be peer-reviewed by at least 3 members of the program committee.
Committee members are not required to read the appendices or any pages past
the maximum. Submissions not meeting these guidelines will be rejected
without consideration of their merit.

Reviews are single-blind, so authors may include names and affiliations in
their submissions. Submitted papers must not substantially overlap papers
that have been published or that are simultaneously submitted to a journal
or a conference with proceedings.

The VizSec proceedings will be published by IEEE. Authors of accepted papers
must guarantee that their papers will be presented at the conference.

* Short Papers *

Short papers should be at most 4 pages including the bibliography and
appendices. Short paper submissions will be reviewed by the Paper Chair(s)
and other members of the organizing committee to determine relevance to the
VizSec community.

Accepted short paper authors will have time to present their work at VizSec
during the program.

* Posters *

Extended abstract should be at most 2 pages including the bibliography.
Poster abstracts will be reviewed by the Poster Chair(s) and other members
of the organizing committee to determine relevance to the VizSec community.

Accepted authors must present a corresponding poster during the workshop.
The poster authors can determine the layout by themselves, but the dimensions
of the posters should not exceed the A0 space (841mmx1189mm or 33.1"x46.8").
Additionally, poster authors are requested to give a brief oral preview
during a plenary "fast forward" session.

Accepted poster abstracts will be made available on this website.

** Important Dates **

All deadlines are 5:00 PM PST.

* Papers and Short Papers *

July 18, 2017: Submission for Papers and Short Papers
August 15, 2017: Author Notification for Papers and Short Papers
September 12, 2017: Camera Ready Submission and Copyright Forms for Papers

* Posters *

August 29, 2017: Abstract Submission for Posters
September 9, 2017: Author Notification for Posters

Related Resources

IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
TyphoonCon 2023   TyphoonCon 2023 - All Offensive Security Conference workshops
IEEE, EI, Scopus-CVIV 2023   2023 5th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2023) -EI Compendex
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
TyphoonCon 2023   TyphoonCon 2023 - All Offensive Security Conference
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
ACM-Ei/Scopus-CNIOT 2023   2023 4th International Conference on Computing, Networks and Internet of Things (CNIOT 2023) -EI Compendex
Frontiers-SI 2023   New trends in Security, Trust, and Privacy in Future Cyber-Systems
NeTCoM 2023   15th International Conference on Networks & Communications