Información de la conferencia
VizSec 2018: IEEE Symposium on Visualization for Cyber Security
http://vizsec.org/vizsec2018/
Día de Entrega:
2018-07-22 Extended
Fecha de Notificación:
2018-08-15
Fecha de Conferencia:
2018-10-22
Ubicación:
Berlin, Germany
Años:
15
Vistas: 7110   Seguidores: 0   Asistentes: 0

Solicitud de Artículos
The 15th IEEE Symposium on Visualization for Cyber Security (VizSec) brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec will be held in Berlin, Germany in conjunction with IEEE VIS, on Monday, October 22nd, 2018.

VizSec explores effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing.

VizSec solicits both full and short papers, both of which will be published in the proceedings that will be published by IEEE. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Technical Papers

Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that improve cyber security practices, including, but not limited to:

    Situation awareness and/or understanding
    Incident handling including triage, exploration, correlation, and response
    Computer forensics
    Recording and reporting results of investigations
    Assisting proactive security configuration and deployment
    Reverse engineering and malware analysis
    Vulnerability management
    Multiple data source analysis
    Analyzing information requirements for computer network defense
    Evaluation and/or user testing of VizSec systems
    Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)
    Modeling system and network behavior
    Modeling attacker and defender behavior
    Studying risk and impact of cyber attacks
    Predicting future attacks or targets
    Security metrics and education
    Software security
    Mobile application security
    Social networking privacy and security

When applicable, visualization and interaction techniques that effectively capture the insights of human analysts and/or allow analysts to collaborate efficiently are particularly desirable.

Submissions including tests and evaluations of existing tools and techniques are also considered particularly desirable. If possible, making the data used for the tests available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VizSec Data Sets page.

Short Papers

Short papers describing practical applications of security visualization are solicited. We encourage the submission of papers discussing the introduction of cyber security visualizations into operational context, including, but not limited to:

    Cases where visualization made positive contributions towards meeting operational needs
    Gaps or negative outcomes from visualization deployments
    Situations where visualization was not utilized, but could have had a positive impact
    Lessons learned from operational engagements
    Insights gained from the transition process

Cyber security practitioners from industry, as well as the research community, are encouraged to submit case studies.

Posters

Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. The poster program will be a great opportunity for the authors to interact with the attendees and solicit feedback. Accepted poster abstracts will be made available on the VizSec website.

Awards

There will be an award for the best paper from the accepted program. This award will be given to the paper judged to have the highest overall quality as determined by the program committee. Key elements of the selection process include whether papers include evaluation, repeatable results, and open-source data or software. Both full and short papers are eligible.

Thanks to the generous support of Two Six Labs, the best paper awardee will receive a $100 Amazon gift card! 
Última Actualización Por Dou Sun en 2018-07-15
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
SE-CLOUDInternational Conference on Software Engineering for Service and Cloud Computing2019-05-202019-06-282019-09-18
ICETISInternational Conference on Electronic Technology and Information Science2018-06-04 2018-06-08
SLSPInternational Conference on Statistical Language and Speech Processing2021-07-162021-08-132021-11-22
ICNEICInternational Conference on Network Engineering and Intelligent Computing2020-09-162020-09-202020-09-28
aab4VisIEEE Visualization Conference2024-03-212024-07-152024-10-13
ICITKMInternational Conference on Information Technology and Knowledge Management2018-10-102018-10-102018-11-02
cb4LATINCOMIEEE Latin-American Conference on Communications2024-07-082024-09-062024-11-06
AISOInternational Conference on Artificial Intelligence and Soft Computing2022-10-082022-10-152022-10-22
cWASAInternational Conference on Wireless Algorithms, Systems, and Applications2022-05-242022-06-252022-08-26
ICGDCInternational Conference on Grid and Distributed Computing2022-05-04 2022-06-13
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
Visualization in EngineeringSpringer2213-7459
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
bACM Transactions of Information and System SecurityACM1094-9224
cJournal of CybersecurityOxford University Press2057-2093
cIET Information Security0.862IET1751-8709
International Journal of Information Security1.988Springer1615-5262
bJournal of Computer Security IOS Press0926-227X
bComputers & Security4.438Elsevier0167-4048
aIEEE Transactions on Information Forensics and Security6.211IEEE1556-6013
International Journal of Data Mining, Modelling and ManagementInderscience1759-1163
Recomendaciones