posted by user: devin || 8333 views || tracked by 13 users: [display]

VizSec 2012 : Symposium on Visualization for Cyber Security

FacebookTwitterLinkedInGoogle


Conference Series : Visualization for Computer Security
 
Link: http://www.ornl.gov/sci/vizsec/
 
When Oct 14, 2012 - Oct 15, 2012
Where Seattle, WA, USA
Submission Deadline Jul 1, 2012
Notification Due Aug 10, 2012
Final Version Due Sep 1, 2012
Categories    security   visualization
 

Call For Papers

The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with VisWeek, the 9th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.

Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IOP, EI, Scopus-PRECE 2022   2022 International Conference on Power, Renewable Energy and Control Engineering (PRECE 2022)-EI Compendex
DMMLACS 2022   3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IJPLA 2022   International Journal of Programming Languages and Applications
ICCSAITCS 2022   International Conference on Cyber Security, Artificial Intelligence and Theoretical Computer Science
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
SCOM 2022   10th International Conference on Soft Computing
WSCG 2022   30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision