Call for Papers
SPIE 2014 Conference on Visualization and Data Analysis
February 3-5, 2014
Hilton San Francisco, Union Square
San Francisco, CA
http://vda-conference.org
Important Dates
===============
Paper Submission Deadline: July 23, 2013
Notification: October 7, 2013
Final Manuscripts: November 25, 2013
-----------------------------------------------------------------------------
The Conference on Visualization and Data Analysis (VDA) 2014 covers all
research and development and application aspects of data visualization and,
more recently, visual analytics. Since the first VDA conference was held in
1994, the annual event has grown steadily into a major venue for
visualization researchers and practitioners from around the world to present
their work and share their experience every year. We invite you to
participate by submitting your original research as full paper or a poster.
Both paper and poster submissions will be peer reviewed. The paper acceptance
rate at VDA 2012 was 48%. Papers presented at this conference will be
published in a bound proceedings published by IS&T/SPIE. Papers and posters
are solicited on all topics of data visualization, including:
* Internet imaging, medical imaging, image processing
* Biomedical visualization and applications
* Internet, web, and security visualizations
* Analysis techniques and data mining
* Data exploration using classical and novel approaches
* Databases and visualization
* High-performance computing and parallel rendering
* Tools and applications exemplified by case studies
* Virtual environments and data visualization
* Information and scientific visualization
* Volume and flow visualization
* Interaction paradigms and human factors
* Big data visualization and analytics
Authors of the best papers will be invited to revise and extend their work
for publication in a special issue of the journal Information Visualization.
Questions regarding paper submission or conference participation should be
directed to the conference chairs:
* Pak Chung Wong (pak.wong(a)pnnl.gov) Pacific Northwest National Lab
* David L. Kao (david.l.kao(a)nasa.gov) NASA Ames Research Center
* Ming C. Hao (ming_hao(a)hp.com) Hewlett-Packard Labs
* Chaomei Chen (Chaomei.Chen(a)cis.drexel.edu) Drexel University
-----------------------------------------------------------------------------
Conference Chairs
=================
* Pak Chung Wong, Pacific Northwest National Laboratory
* David Kao, NASA Ames Research Center
* Ming C. Hao, Hewlett-Packard Laboratories
* Chaomei Chen, Drexel University
Conference Co-Chairs
====================
* Christoper G. Healey, North Carolina State University
* Mark A. Livingston, Naval Research Laboratory
* Thomas Wischgoll, Wright State University
* Ian Roberts, Pacific Northwest National Laboratory
Steering Committee
==================
* Umeshwar Dayal, Hewlett Packard Laboratories
* Robert Erbacher, Northwest Security Institute
Program Committee
=================
* Aidong Lu, The Univ. of North Carolina at Charlotte
* Alark Joshi, Boise State Univ.
* Andreas Kerren, Linnaeus University, Sweden
* Barry Becker, Pros
* Bob Lewis, Washington State Univ.
* Caroline Ziemkiewicz, Brown University
* Chad A. Steed, Oak Ridge National Lab.
* Chaoli Wang, Michigan Tech University
* Christoph Garth, University of Kaiserslautern
* Daniel Cernea, Univ. of Kaiserslautern
* Donald A. Pellegrino, Dow Chemical
* Guoning Chen, The Univ. of Utah
* Guo-Shi Li, ExxonMobil Upstream Research Company
* Halldor Janetzko, Univ. Konstanz, Germany
* Hank Childs, University of Oregon
* Harald Obermaier, University of California, Davis
* Jaegul Choo, Georgia Tech
* John Gerth, Stanford University
* Kalpathi R. Subramanian, The Univ. of North Carolina at Charlotte
* Lars Linsen, Jacobs Univ. Bremen gGmbH, Germany
* Madjid Allili, Bishop's Univ., Canada
* Matti T. Gröhn, Ctr. for Scientific Computing, Finland
* Ming Jiang, Lawrence Livermore National Lab.
* Ming-Hsuan Yang, UC Merced
* Peter Lindstrom, Lawrence Livermore National Lab.
* Remco Chang, Tufts University
* Richard May, Pacific Northwest National Lab.
* Shigeo Takahashi, University of Tokyo
* Sussan Einakian, The Univ. of Alabama in Huntsville
* Theresa-Marie Rhyne, Computer Graphics and E-Learning
* Tobias Schreck, Univ. Konstanz, Germany
* Yi-Jen Chiang, Polytechnic Institute of NYU
* Zhanping Liu, Kentucky State University
**NOTE: PAPER DEADLINE EXTENDED TO JULY 22**
VIZSEC 2013
=======================================
VizSec will be held in Atlanta GA, USA on October 14, 2013. VizSec
brings together researchers and practitioners in information
visualization and security to address the specific needs of the cyber
security community through new and insightful visualization
techniques.
VizSec will be held as a workshop at IEEE VIS.
The proceedings will be in the ACM Digital Library. Proceedings will
be publicly available for one week prior to the event.
Call for Papers (REVISED)
=======================================
The 10th Visualization for Cyber Security (VizSec) is a forum that
brings together researchers and practitioners from academia,
government, and industry to address the needs of the cyber security
community through new and insightful visualization and analysis
techniques. VizSec will provide an excellent venue for fostering
greater exchange and new collaborations on a broad range of security-
and privacy-related topics. Accepted papers will appear in the ACM
Digital Library as part of the ACM International Conference
Proceedings Series.
Important research problems often lie at the intersection of disparate
domains. Our focus is to explore effective, scalable visual interfaces
for security domains, where visualization may provide a distinct
benefit, including computer forensics, reverse engineering, insider
threat detection, cryptography, privacy, preventing 'user assisted'
attacks, compliance management, wireless security, secure coding, and
penetration testing in addition to traditional network security. Human
time and attention are precious resources. We are particularly
interested in visualization and interaction techniques that
effectively capture human analyst insights so that further processing
may be handled by machines, freeing the analyst for other tasks. For
example, a malware analyst might use a visualization system to analyze
a new piece of malicious software and then facilitate generating a
signature for future machine processing. When appropriate, research
that incorporates multiple data sources, such as network packet
captures, firewall rule sets and logs, DNS logs, web server logs,
and/or intrusion detection system logs, is particularly desirable.
Technical Papers
---------------------------------------
Full papers offering novel contributions in security visualization are
solicited. Papers may present techniques, applications, practical
experience, theory, analysis, or experiments and evaluations. We
encourage papers on technologies and methods that promise to improve
cyber security practices, including, but not limited to:
- Situational awareness / understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigation
- Reverse engineering and malware analysis
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation / User testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security
visualizations (whether from a security goal perspective or a human
factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security
- Cyber intelligence
- Human factors in cyber security
Posters
---------------------------------------
Poster submissions may showcase late-breaking results, work in
progress, preliminary results, or visual representations relevant to
the VizSec community. Accepted poster abstracts will be made available
on this website.
Awards
---------------------------------------
There will be an award for the best paper from the accepted program.
The best paper award will be given to the paper judged to have the
highest overall quality. A key element of the best paper selection
process will be whether the results are believed to be repeatable by
other scientists based on the algorithms and data provided in the
paper. This award will be chosen by the program committee.
Data
---------------------------------------
If you do not have real-world data to demonstrate your visualization,
you may be interested in looking at the VAST 2012 Challenge data. VAST
2011 also had cyber security data if you are looking for additional
data.
Submissions
=======================================
Papers
---------------------------------------
Papers should be at most 8 pages including the bibliography and
appendices. Committee members are not required to read the appendices
or any pages past the maximum. Submissions not meeting these
guidelines will be rejected without consideration of their merits.
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Authors of accepted papers must guarantee
that their papers will be presented at the conference, preferably by
themselves or by prior arrangement through a delegate.
Posters
---------------------------------------
Poster submissions consist of an extended abstract of at most 2 pages
including figures and references. Authors must present a corresponding
poster during the designated poster session. Poster authors have the
opportunity to give a brief oral preview during a plenary "fast
forward" session.
Paper Formatting
---------------------------------------
The VizSec proceedings will be published by ACM. The ACM SIG
Proceedings Templates provides Word and LaTeX templates. (If you are
using LaTeX, please use Option 2: LaTeX2e - Tighter Alternate style.)
Authors should apply ACM Computing Classification categories and
terms. ACM invites authors to submit an image representation of their
article. The image must be selected from the article body and can be
any of the following: art, graphic, table, figures, etc. (Image files
are to be as square as possible, 100x100 ppi and in jpg format.)
Authors must supply a caption with the image. The caption length
should be no more than 512 characters.
Submission
---------------------------------------
Submit papers and poster abstracts using EasyChair:
<http://www.easychair.org/conferences/?conf=vizsec2013>
Important Dates (Updated)
=======================================
Papers
---------------------------------------
*All deadlines are 5:00 PM EDT.*
Jul 22 2013: Submission for Papers *(EXTENDED)*
Aug 23 2013: Author Notification for Papers
Sep 06 2013: Camera Ready Submission and Copyright Forms for Papers
Oct 08 2013: Papers Available in ACM Digital Library
Posters
---------------------------------------
Aug 23 2013: Abstract Submission for Posters
Sep 01 2013: Author Notification for Posters
Hotel and Venue
---------------------------------------
The conference will be located at the downtown Marriott Marquis Hotel.
The Atlanta Marriott Marquis, 3rd largest Marriott in the world, rises
50 stories and contains 1,569 rooms and 94 suites. For more
information see the IEEE VIS venue information page, hotel information
page, and travel information page.
Committee
=======================================
**General Chair**
John Goodall, Oak Ridge National Laboratory
**Program Chair**
Kwan-Liu Ma, University of California, Davis
**Publications / Publicity Chair**
Sophie Engle, University of San Francisco
**Poster Chair**
Fabian Fischer, University of Konstanz
Program Committee
---------------------------------------
- David Barrera, Carleton University
- Daniel Best, Pacific Northwest National Laboratory
- Greg Conti, US Military Academy at West Point
- Gustavo de los Reyes, AT&T
- Ron Dilley, UberAdmin
- David Ebert, Purdue University
- Alex Endert, Pacific Northwest National Laboratory
- Rob Erbacher, Army Research Laboratory
- Carrie Gates, CA Technologies
- John Gerth, Stanford University
- T. J. Jankun-Kelly, Mississippi State University
- Lane Harrison, University of North Carolina, Charlotte
- Jörn Kohlhammer, Fraunhofer IGD
- Raffael Marty, PixlCloud
- Chris Muelder, University of California, Davis
- Stephen North, AT&T
- Joe Parry, Cambridge Intelligence
- Celeste Lyn Paul, Department of Defense
- Teryl Taylor, University of North Carolina
- Olivier Thonnard, Symantec
- Joanne Treurniet, Defence Research and Development Canada
- Anatoly Yelizarov, Lomonosov Moscow State University
- Tamara Yu, MIT Lincoln Laboratory
Contact
=======================================
See <http://www.vizsec.org> for more information. Email questions to
<vizsec2013(a)easychair.org> or post to the Google Group
<https://groups.google.com/forum/#!forum/vizsec>.
# Welcome to VizSec 2013 #
VizSec will be held in Atlanta GA, USA on October 14, 2013. VizSec
brings together researchers and practitioners in information
visualization and security to address the specific needs of the cyber
security community through new and insightful visualization
techniques.
VizSec will be held as a workshop at IEEE VIS.
The proceedings will be in the ACM Digital Library. Proceedings will
be publicly available from around October 1 until the day of the
event.
# Call for Papers #
The 10th Visualization for Cyber Security (VizSec) is a forum that
brings together researchers and practitioners from academia,
government, and industry to address the needs of the cyber security
community through new and insightful visualization and analysis
techniques. VizSec will provide an excellent venue for fostering
greater exchange and new collaborations on a broad range of security-
and privacy-related topics. Accepted papers will appear in the ACM
Digital Library as part of the ACM International Conference
Proceedings Series.
Important research problems often lie at the intersection of disparate
domains. Our focus is to explore effective, scalable visual interfaces
for security domains, where visualization may provide a distinct
benefit, including computer forensics, reverse engineering, insider
threat detection, cryptography, privacy, preventing 'user assisted'
attacks, compliance management, wireless security, secure coding, and
penetration testing in addition to traditional network security. Human
time and attention are precious resources. We are particularly
interested in visualization and interaction techniques that
effectively capture human analyst insights so that further processing
may be handled by machines, freeing the analyst for other tasks. For
example, a malware analyst might use a visualization system to analyze
a new piece of malicious software and then facilitate generating a
signature for future machine processing. When appropriate, research
that incorporates multiple data sources, such as network packet
captures, firewall rule sets and logs, DNS logs, web server logs,
and/or intrusion detection system logs, is particularly desirable.
## Technical Papers ##
Full papers offering novel contributions in security visualization are
solicited. Papers may present techniques, applications, practical
experience, theory, analysis, or experiments and evaluations. We
encourage papers on technologies and methods that promise to improve
cyber security practices, including, but not limited to:
- Situational awareness / understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigation
- Reverse engineering and malware analysis
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation / User testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security
visualizations (whether from a security goal perspective or a human
factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security
- Cyber intelligence
- Human factors in cyber security
## Posters ##
Poster submissions may showcase late-breaking results, work in
progress, preliminary results, or visual representations relevant to
the VizSec community. Accepted poster abstracts will be made available
on this website.
## Awards ##
There will be an award for the best paper from the accepted program.
The best paper award will be given to the paper judged to have the
highest overall quality. A key element of the best paper selection
process will be whether the results are believed to be repeatable by
other scientists based on the algorithms and data provided in the
paper. This award will be chosen by the program committee.
## Data ##
If you do not have real-world data to demonstrate your visualization,
you may be interested in looking at the VAST 2012 Challenge data. VAST
2011 also had cyber security data if you are looking for additional
data.
# Submissions #
## Papers ##
Papers should be at most 8 pages including the bibliography and
appendices. Committee members are not required to read the appendices
or any pages past the maximum. Submissions not meeting these
guidelines will be rejected without consideration of their merits.
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Authors of accepted papers must guarantee
that their papers will be presented at the conference, preferably by
themselves or by prior arrangement through a delegate.
## Posters ##
Poster submissions consist of an extended abstract of at most 2 pages
including figures and references. Authors must present a corresponding
poster during the designated poster session. Poster authors have the
opportunity to give a brief oral preview during a plenary "fast
forward" session.
## Paper Formatting ##
The VizSec proceedings will be published by ACM. The ACM SIG
Proceedings Templates provides Word and LaTeX templates. (If you are
using LaTeX, please use Option 2: LaTeX2e - Tighter Alternate style.)
Authors should apply ACM Computing Classification categories and
terms. ACM invites authors to submit an image representation of their
article. The image must be selected from the article body and can be
any of the following: art, graphic, table, figures, etc. (Image files
are to be as square as possible, 100x100 ppi and in jpg format.)
Authors must supply a caption with the image. The caption length
should be no more than 512 characters.
## Submission ##
Submit papers and poster abstracts using EasyChair:
<http://www.easychair.org/conferences/?conf=vizsec2013>
# Important Dates #
## Papers ##
- Jul 08, 2013: Submission for Papers
- Aug 16, 2013: Author Notification for Papers
- Aug 30, 2013: Camera Ready Submission and Copyright Forms for Papers
- Oct 01, 2013: Papers Available in ACM Digital Library
## Posters ##
- Aug 23, 2013: Abstract Submission for Posters
- Sep 15, 2013: Author Notification for Poster
# Hotel and Venue #
The conference will be located at the downtown Marriott Marquis Hotel.
The Atlanta Marriott Marquis, 3rd largest Marriott in the world, rises
50 stories and contains 1,569 rooms and 94 suites. For more
information see the IEEE VIS venue information page, hotel information
page, and travel information page.
# Committee #
**General Chair**
John Goodall, Oak Ridge National Laboratory
**Program Chair**
Kwan-Liu Ma, University of California, Davis
**Publications / Publicity Chair**
Sophie Engle, University of San Francisco
**Poster Chair**
Fabian Fischer, University of Konstanz
## Program Committee ##
- David Barrera, Carleton University
- Daniel Best, Pacific Northwest National Laboratory
- Greg Conti, US Military Academy at West Point
- Gustavo de los Reyes, AT&T
- Ron Dilley, UberAdmin
- David Ebert, Purdue University
- Alex Endert, Pacific Northwest National Laboratory
- Rob Erbacher, Army Research Laboratory
- Carrie Gates, CA Technologies
- John Gerth, Stanford University
- T. J. Jankun-Kelly, Mississippi State University
- Lane Harrison, University of North Carolina, Charlotte
- Jörn Kohlhammer, Fraunhofer IGD
- Raffael Marty, PixlCloud
- Chris Muelder, University of California, Davis
- Stephen North, AT&T
- Joe Parry, Cambridge Intelligence
- Celeste Lyn Paul, Department of Defense
- Teryl Taylor, University of North Carolina
- Olivier Thonnard, Symantec
- Joanne Treurniet, Defence Research and Development Canada
- Anatoly Yelizarov, Lomonosov Moscow State University
- Tamara Yu, MIT Lincoln Laboratory
# Contact #
See <http://vizsec.org/> for more information. Email questions to
<vizsec2013(a)easychair.org> or post to the Google Group at
<https://groups.google.com/forum/#!forum/vizsec>.