2007-12-21: CFP: VizSEC 2008 Workshop on Visualization for Cyber Security

From InfoVis:Wiki
Jump to: navigation, search

VizSEC_2008[edit]

Workshop on Visualization for Cyber Security[edit]

September 15, 2008 / Cambridge, MA USA[edit]

In conjunction with RAID 2008[edit]

http://vizsec.org/workshop2008/[edit]

The 5th International Workshop on Visualization for Cyber Security will provide a forum for new research in visualization for computer security. We are pleased to be holding this year's meeting in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection. The VizSEC Workshop will be held at MIT in Cambridge, Massachusetts USA on Monday, September 15, 2008.

As a result of previous VizSEC workshops, we have seen both the application of existing visualization techniques to security problems and the development of novel security visualization approaches. However, VizSEC research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. Other communities, led by researchers from the RAID Symposia, have researched automated methods for detecting anomalies and malicious activity.

The theme for this year's workshop, which will be held in conjunction with RAID 2008, will be on bridging the gap between visualization and automation, such as leveraging the power of visualization to create rules for intrusion detection and defense systems. We hope that VizSEC participants will stay for the RAID Symposium and RAID participants will consider coming a day early to participate in VizSEC.

We also solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including:

  • Visualization of Internet routing
  • Visualization of packet traces and network flows
  • Visualization of intrusion detection alerts
  • Visualization of attack tracks
  • Visualization of security vulnerabilities
  • Visualization of attack paths
  • Visualization of application processes
  • Visualization for forensic analysis
  • Visualization for correlating events
  • Visualization for computer network defense training
  • Visualization for offensive information operations
  • Visualization for building rules
  • Visualization for feature selection
  • Visualization for cryptology
  • Visualization for detecting anomalous activity
  • Deployment and field testing of VizSEC systems
  • Evaluation and user testing of VizSEC systems
  • User and design requirements for VizSEC systems
  • Lessons learned from development and deployment of VizSEC systems

All submitted papers will be peer-reviewed. Full and short papers from the workshop will be published in an edited book (details to follow).

Full Papers[edit]

Full papers should present mature research results. (We will release page count and formatting instructions when we confirm the details of publishing the proceedings.)

Short Papers[edit]

Short papers can be used to present less mature research results than full papers, or late-breaking results. (We will release page count and formatting instructions when we confirm the details of publishing the proceedings.)

Demos[edit]

Demonstrations can be used to show new or updated development efforts. Demo submissions should consist of a 2 page abstract.

Posters[edit]

Posters can be used to describe work in progress or updates to previously published VizSEC research or R&D. Poster submissions should consist of a 2 page abstract.

Deadlines[edit]

April 11, 2008 : Deadline for full paper submission

May 9, 2008 : Deadline for short paper submissions

July 11, 2008 : Deadline for poster and demo abstracts