Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Browse files

fixed rootUrl for ornl site

  • Loading branch information...
commit 5adc0f4c7606ac858a8c1ad0dfc6ef4e3cb0e9b8 1 parent 2a1aea8
@jgoodall jgoodall authored
View
2  deploy/about.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>About VizSec</h1></header><section id="history"><div class="page-header"><h2>History</h2></div><p>VizSec started in 2004 as the <a href='http://www.cs.fit.edu/~pkc/vizdmsec04/'>Workshop on Visualization and Data Mining for Computer Security</a> at <a href='http://www.sigsac.org/ccs/CCS2004/workshops.html'>ACM CCS</a>. After that first event, the event got bigger and bigger each year as it rotated between a visualization-focused conference and a security-focused conference. After several different publishers for the proceedings, VizSec in 2010 began to publish proceedings with <a href='https://dl.acm.org/icps.cfm'>ACM ICPS</a>.</p></section><section id="organizing"><div class="page-header"><h2>Organizing VizSec</h2></div><p>VizSec is independently run and we are always looking for people to help out, on the organizing and program committees, with sponsorship and publicizing, and with writing high quality papers. Contact <a href='http://www.ornl.gov/~ojg/'>John Goodall</a>.</p><p>The roles and responsibilities of the organizing committee is documented on the <a href='./roles.html'>Committee Roles page</a>.</p><p>Places that we have publicized in the past is documented on the <a href='./publicity.html'>Publicity page</a>.</p></section><section id="steering"><div class="page-header"><h2>Steering Committee</h2></div><ul><li><a href='http://www.gregconti.com/'>Gregory Conti</a>, US Military Academy, West Point</li><li>Deborah Frincke, US Department of Defense</li><li><a href='http://www.ca.com/us/about-us/Innovation/ca-labs/people/gates.aspx'>Carie Gates</a>, CA Labs</li><li><a href='http://graphics.stanford.edu/~gerth/'>John Gerth</a>, Stanford University</li><li><a href='http://www.ornl.gov/~ojg/'>John Goodall</a>, Oak Ridge National Laboratory</li><li><a href='http://www.cs.ucdavis.edu/~ma/'>Kwan-Liu Ma</a>, University of California at Davis</li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>About VizSec</h1></header><section id="history"><div class="page-header"><h2>History</h2></div><p>VizSec started in 2004 as the <a href='http://www.cs.fit.edu/~pkc/vizdmsec04/'>Workshop on Visualization and Data Mining for Computer Security</a> at <a href='http://www.sigsac.org/ccs/CCS2004/workshops.html'>ACM CCS</a>. After that first event, the event got bigger and bigger each year as it rotated between a visualization-focused conference and a security-focused conference. After several different publishers for the proceedings, VizSec in 2010 began to publish proceedings with <a href='https://dl.acm.org/icps.cfm'>ACM ICPS</a>.</p></section><section id="organizing"><div class="page-header"><h2>Organizing VizSec</h2></div><p>VizSec is independently run and we are always looking for people to help out, on the organizing and program committees, with sponsorship and publicizing, and with writing high quality papers. Contact <a href='http://www.ornl.gov/~ojg/'>John Goodall</a>.</p><p>The roles and responsibilities of the organizing committee is documented on the <a href='./roles.html'>Committee Roles page</a>.</p><p>Places that we have publicized in the past is documented on the <a href='./publicity.html'>Publicity page</a>.</p></section><section id="steering"><div class="page-header"><h2>Steering Committee</h2></div><ul><li><a href='http://www.gregconti.com/'>Gregory Conti</a>, US Military Academy, West Point</li><li>Deborah Frincke, US Department of Defense</li><li><a href='http://www.ca.com/us/about-us/Innovation/ca-labs/people/gates.aspx'>Carie Gates</a>, CA Labs</li><li><a href='http://graphics.stanford.edu/~gerth/'>John Gerth</a>, Stanford University</li><li><a href='http://www.ornl.gov/~ojg/'>John Goodall</a>, Oak Ridge National Laboratory</li><li><a href='http://www.cs.ucdavis.edu/~ma/'>Kwan-Liu Ma</a>, University of California at Davis</li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/index.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2012 <small> Symposium on Visualization for Cyber Security</small></h1><p>October 14 or 15, 2012 &nbsp; / &nbsp; Seattle, WA, USA</p><p>In conjunction with <a href="http://visweek.org/">VisWeek</a></p></header><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with VisWeek, the 9th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that have been demonstrated to be useful for improving cyber security practices, including but not limited to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><p>Accepted papers will appear in the ACM Digital Library two weeks prior to the conference. The program committee will select an accepted paper to receive the VizSec Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p><h3>Awards</h3><p>There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.</p><h3>Data</h3><p>If you do not have real-world data to demonstrate your visualization, you may be interested in looking at, and perhaps submitting an entry, for this year's <a href="http://www.vacommunity.org/VAST+Challenge+2012">VAST Challenge</a>. </p><p><a href="http://hcil.cs.umd.edu/localphp/hcil/vast11/index.php">Last year's challenge</a> also had cybersecurity data if you are looking for additional data.</p></section><section id="sub"><div class="page-header"><h2>Submissions</h2></div><h3>Papers</h3><p>Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.</p><h3>Paper Formatting</h3><p>The VizSec proceedings will be published by ACM. The <a href='http://www.acm.org/sigs/publications/proceedings-templates'> ACM SIG Proceedings Templates</a> provides Word and LaTeX templates. </p><p>Authors should apply <a href='http://www.acm.org/about/class/1998'>ACM Computing Classification categories and terms</a>. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.</p><h3>Submission</h3><p>Submit papers using EasyChair: <a href='http://www.easychair.org/conferences/?conf=vizsec2012'>http://www.easychair.org/conferences/?conf=vizsec2012</a></p></section><section id="dat"><div class="page-header"><h2>Dates</h2></div><dl class="dl-horizontal"><dt>July 1, 2012</dt><dd>Paper Submission</dd><dt>August 10, 2012</dt><dd>Author Notification</dd><dt>September 1, 2012</dt><dd>Camera Ready Submission and Copyright forms</dd><dt>October 1, 2012</dt><dd>Papers available in ACM Digital Library</dd><dt>October 14 or 15, 2012</dt><dd>VizSec</dd></dl></section><section id="hot"><div class="page-header"><h2>Hotel</h2></div><p>VizSec will be held in conjunction with <a href='http://visweek.org/'>VisWeek</a> at the <a href='http://www.sheratonseattle.com/'>Seattle Sheraton Hotel</a>. </p><p>See <a href='http://visweek.org/visweek/2012/info/registration/hotel-reservations'>the VisWeek hotel reservations page</a> for information about the conference room rate.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Program Chair</dt><dd>Daniel Quist, Los Alamos National Laboratory</dd><dt>Publications Chair</dt><dd>John Goodall, Oak Ridge National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>David Barrera, Carleton University</li><li>Richard Bejtlich, TaoSecurity</li><li>Greg Conti, US Military Academy at West Point</li><li>Ron Dilley, UberAdmin</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Army Research Laboratory</li><li>Carrie Gates, CA Technologies</li><li>John Gerth, Stanford University</li><li>Mark Haselkorn, University of Washington</li><li>Tyler Hudak, KoreLogic Security</li><li>Kohlhammer J&ouml;rn, Fraunhofer IGD</li><li>Florian Mansmann, Universit&auml;t Konstanz</li><li>Raffael Marty, PixlCloud</li><li>Jan Monsch, Google</li><li>Stephen North, AT&T</li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec</li><li>Joanne Treurniet, Defence Research and Development Canada</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li><li>Anatoly Yelizarov, Lomonosov Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li><li>Daniel Best, Pacific Northwest National Laboratory</li></ul></section><section id="con"><div class="page-header"><h2>Contact</h2></div><p>Email questions about VizSec 2012 to Dino Schweitzer: &nbsp; &nbsp; dino <span style='font-size:65%'>&lt; dot &gt;</span> schweitzer <span style='font-size:65%'>&lt; at &gt;</span> gmail <span style='font-size:65%'>&lt; dot &gt;</span> com </p></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2012 <small> Symposium on Visualization for Cyber Security</small></h1><p>October 14 or 15, 2012 &nbsp; / &nbsp; Seattle, WA, USA</p><p>In conjunction with <a href="http://visweek.org/">VisWeek</a></p></header><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with VisWeek, the 9th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that have been demonstrated to be useful for improving cyber security practices, including but not limited to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><p>Accepted papers will appear in the ACM Digital Library two weeks prior to the conference. The program committee will select an accepted paper to receive the VizSec Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p><h3>Awards</h3><p>There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.</p><h3>Data</h3><p>If you do not have real-world data to demonstrate your visualization, you may be interested in looking at, and perhaps submitting an entry, for this year's <a href="http://www.vacommunity.org/VAST+Challenge+2012">VAST Challenge</a>. </p><p><a href="http://hcil.cs.umd.edu/localphp/hcil/vast11/index.php">Last year's challenge</a> also had cybersecurity data if you are looking for additional data.</p></section><section id="sub"><div class="page-header"><h2>Submissions</h2></div><h3>Papers</h3><p>Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.</p><h3>Paper Formatting</h3><p>The VizSec proceedings will be published by ACM. The <a href='http://www.acm.org/sigs/publications/proceedings-templates'> ACM SIG Proceedings Templates</a> provides Word and LaTeX templates. </p><p>Authors should apply <a href='http://www.acm.org/about/class/1998'>ACM Computing Classification categories and terms</a>. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.</p><h3>Submission</h3><p>Submit papers using EasyChair: <a href='http://www.easychair.org/conferences/?conf=vizsec2012'>http://www.easychair.org/conferences/?conf=vizsec2012</a></p></section><section id="dat"><div class="page-header"><h2>Dates</h2></div><dl class="dl-horizontal"><dt>July 1, 2012</dt><dd>Paper Submission</dd><dt>August 10, 2012</dt><dd>Author Notification</dd><dt>September 1, 2012</dt><dd>Camera Ready Submission and Copyright forms</dd><dt>October 1, 2012</dt><dd>Papers available in ACM Digital Library</dd><dt>October 14 or 15, 2012</dt><dd>VizSec</dd></dl></section><section id="hot"><div class="page-header"><h2>Hotel</h2></div><p>VizSec will be held in conjunction with <a href='http://visweek.org/'>VisWeek</a> at the <a href='http://www.sheratonseattle.com/'>Seattle Sheraton Hotel</a>. </p><p>See <a href='http://visweek.org/visweek/2012/info/registration/hotel-reservations'>the VisWeek hotel reservations page</a> for information about the conference room rate.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Program Chair</dt><dd>Daniel Quist, Los Alamos National Laboratory</dd><dt>Publications Chair</dt><dd>John Goodall, Oak Ridge National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>David Barrera, Carleton University</li><li>Richard Bejtlich, TaoSecurity</li><li>Greg Conti, US Military Academy at West Point</li><li>Ron Dilley, UberAdmin</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Army Research Laboratory</li><li>Carrie Gates, CA Technologies</li><li>John Gerth, Stanford University</li><li>Mark Haselkorn, University of Washington</li><li>Tyler Hudak, KoreLogic Security</li><li>Kohlhammer J&ouml;rn, Fraunhofer IGD</li><li>Florian Mansmann, Universit&auml;t Konstanz</li><li>Raffael Marty, PixlCloud</li><li>Jan Monsch, Google</li><li>Stephen North, AT&T</li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec</li><li>Joanne Treurniet, Defence Research and Development Canada</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li><li>Anatoly Yelizarov, Lomonosov Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li><li>Daniel Best, Pacific Northwest National Laboratory</li></ul></section><section id="con"><div class="page-header"><h2>Contact</h2></div><p>Email questions about VizSec 2012 to Dino Schweitzer: &nbsp; &nbsp; dino <span style='font-size:65%'>&lt; dot &gt;</span> schweitzer <span style='font-size:65%'>&lt; at &gt;</span> gmail <span style='font-size:65%'>&lt; dot &gt;</span> com </p></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/past.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Past Events </h1></header><section id="2011"><div class="page-header"><h2><a href='./vizsec2011'>VizSec 2011</a></h2></div><p>8th International Symposium on Visualization for Cyber Security, with <a href='http://cups.cs.cmu.edu/soups/'>SOUPS</a></p><p>Pittsburgh, PA, USA / July 20, 2011</p><p>Acceptance Rates: 6 / 11 (55%)</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=2016904'>ACM Digital Library</a></p></section><section id="2010"><div class="page-header"><h2><a href='./vizsec2010'>VizSec 2010</a></h2></div><p>7th International Symposium on Visualization for Cyber Security, with <a href='http://www.raid-symposium.org/'>RAID</a></p><p>Ottawa, ON, Canada / September 14, 2010</p><p>Acceptance Rates: 12 / 27 (44%) - Full papers: 8 / 15, Short papers: 4 / 12</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1850795'>ACM Digital Library</a></p></section><section id="2009"><div class="page-header"><h2>VizSec 2009</h2></div><p>6th International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Atlantic City, NJ, USA / October 11, 2009</p><p>Acceptance Rates: 10 / 23 (43%) - Full papers: 4 / 10, Short papers: 6 / 13</p><p>Proceedings: <a href='http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5368324'>IEEE Digital Library</a></p></section><section id="2008"><div class="page-header"><h2>VizSec 2008</h2></div><p>5th International Workshop on Visualization for Cyber Security, with <a href='http://www.raid-symposium.org/'>RAID</a></p><p>Cambridge, MA, USA / September 15, 2008</p><p>Acceptance Rates: 18 / 27 (67%) - Full papers: 8 / 11, Short papers: 10 / 16</p><p>Proceedings: <a href='http://www.springerlink.com/content/978-3-540-85931-4'>Springer Link</a></p></section><section id="2007"><div class="page-header"><h2>VizSec 2007</h2></div><p>4th International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Sacramento, CA, USA / October 29, 2007</p><p>Acceptance Rates: 14 / 16 (88%)</p><p>Proceedings: <a href='http://www.springerlink.com/content/978-3-540-78243-8'>Springer Link</a></p></section><section id="2006"><div class="page-header"><h2>VizSec 2006</h2></div><p>3th International Workshop on Visualization for Cyber Security, with <a href='http://www.sigsac.org/ccs.html'>ACM CCS</a></p><p>Washington, DC, USA / November 3, 2006</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1179576'>ACM Digital Library</a></p></section><section id="2005"><div class="page-header"><h2>VizSec 2005</h2></div><p>2nd International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Minneapolis, MN, USA / October 26, 2005</p><p><a href='http://www.cs.ucdavis.edu/~ma/VizSEC05/'>web site</a></p><p>Proceedings: <a href='http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10259'>IEEE Digital Library</a></p></section><section id="2004"><div class="page-header"><h2>VizSec 2004</h2></div><p>Workshop on Visualization and Data Mining for Computer Security, with <a href='http://www.sigsac.org/ccs.html'>ACM CCS</a></p><p>Washington, DC, USA / October 29, 2004</p><p><a href='http://www.cs.fit.edu/~pkc/vizdmsec04/'>web site</a></p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1029208'>ACM Digital Library</a></p></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Past Events </h1></header><section id="2011"><div class="page-header"><h2><a href='./vizsec2011'>VizSec 2011</a></h2></div><p>8th International Symposium on Visualization for Cyber Security, with <a href='http://cups.cs.cmu.edu/soups/'>SOUPS</a></p><p>Pittsburgh, PA, USA / July 20, 2011</p><p>Acceptance Rates: 6 / 11 (55%)</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=2016904'>ACM Digital Library</a></p></section><section id="2010"><div class="page-header"><h2><a href='./vizsec2010'>VizSec 2010</a></h2></div><p>7th International Symposium on Visualization for Cyber Security, with <a href='http://www.raid-symposium.org/'>RAID</a></p><p>Ottawa, ON, Canada / September 14, 2010</p><p>Acceptance Rates: 12 / 27 (44%) - Full papers: 8 / 15, Short papers: 4 / 12</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1850795'>ACM Digital Library</a></p></section><section id="2009"><div class="page-header"><h2>VizSec 2009</h2></div><p>6th International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Atlantic City, NJ, USA / October 11, 2009</p><p>Acceptance Rates: 10 / 23 (43%) - Full papers: 4 / 10, Short papers: 6 / 13</p><p>Proceedings: <a href='http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5368324'>IEEE Digital Library</a></p></section><section id="2008"><div class="page-header"><h2>VizSec 2008</h2></div><p>5th International Workshop on Visualization for Cyber Security, with <a href='http://www.raid-symposium.org/'>RAID</a></p><p>Cambridge, MA, USA / September 15, 2008</p><p>Acceptance Rates: 18 / 27 (67%) - Full papers: 8 / 11, Short papers: 10 / 16</p><p>Proceedings: <a href='http://www.springerlink.com/content/978-3-540-85931-4'>Springer Link</a></p></section><section id="2007"><div class="page-header"><h2>VizSec 2007</h2></div><p>4th International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Sacramento, CA, USA / October 29, 2007</p><p>Acceptance Rates: 14 / 16 (88%)</p><p>Proceedings: <a href='http://www.springerlink.com/content/978-3-540-78243-8'>Springer Link</a></p></section><section id="2006"><div class="page-header"><h2>VizSec 2006</h2></div><p>3th International Workshop on Visualization for Cyber Security, with <a href='http://www.sigsac.org/ccs.html'>ACM CCS</a></p><p>Washington, DC, USA / November 3, 2006</p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1179576'>ACM Digital Library</a></p></section><section id="2005"><div class="page-header"><h2>VizSec 2005</h2></div><p>2nd International Workshop on Visualization for Cyber Security, with <a href='http://visweek.org/'>IEEE Vis Week</a></p><p>Minneapolis, MN, USA / October 26, 2005</p><p><a href='http://www.cs.ucdavis.edu/~ma/VizSEC05/'>web site</a></p><p>Proceedings: <a href='http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10259'>IEEE Digital Library</a></p></section><section id="2004"><div class="page-header"><h2>VizSec 2004</h2></div><p>Workshop on Visualization and Data Mining for Computer Security, with <a href='http://www.sigsac.org/ccs.html'>ACM CCS</a></p><p>Washington, DC, USA / October 29, 2004</p><p><a href='http://www.cs.fit.edu/~pkc/vizdmsec04/'>web site</a></p><p>Proceedings: <a href='http://dl.acm.org/citation.cfm?id=1029208'>ACM Digital Library</a></p></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/publicity.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Publicity</h1></header><section id="lists"><div class="page-header"><h2>Mailing Lists</h2></div><ul><li><a href='http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org'>VizSEC</a> - info@lists.vizsec.org</li><li><a href='http://www.infovis.org/mailman/listinfo/infovis'>Infovis</a> - infovis@infovis.org</li><li>FloCommunity mailing list - flocommunity@cert.org</li><li><a href='https://dlist.server.uni-frankfurt.de/mailman/listinfo/ifip-tc11'>IFIP TC 11</a> - ifip-tc11@dlist.uni-frankfurt.de</li><li><a href='http://research.cs.wisc.edu/dbworld/'>DBWorld</a></li><li><a href='https://lists.cs.columbia.edu/mailman/listinfo/tccc'>IEEE ComSoc Technical Committee on Computer Communications</a></li><li>Spafford's list: ias-opportunities@cerias.purdue.edu</li></ul></section><section id="websites"><div class="page-header"><h2>Web Sites</h2></div><ul><li><a href='http://confcal.vrvis.at/'>VRVis</a> (email step@vrvis.at)</li><li><a href='http://www.infovis-wiki.net/'>Infovis-Wiki</a> (wiki)</li><li><a href='http://secviz.org/'>SecViz.org</a> (form)</li><li><a href='http://graphicsconferences.wikidot.com/upcoming-conferences/'>Computer Graphics Conferences Wiki</a> (email beovar at gmail.com to add conference)</li><li><a href='http://www.acm.org/conferences'>ACM</a> (form)</li><li><a href='http://www.computer.org/conferences/calendar.htm'>IEEE</a> (email calendar@computer.org)</li><li><a href='http://www.ieee-security.org/Calendar/submitting.html'>IEEE Cypher</a> (email cipher-cfp@ieee-security.org)</li><li><a href='http://www.usenix.org/events/links_to_other.html'>Usenix</a> (email other_events@usenix.org)</li><li><a href='http://www.iacr.org/events/submit.html'>International Association for Cryptologic Research Calendar</a> (form) </li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Publicity</h1></header><section id="lists"><div class="page-header"><h2>Mailing Lists</h2></div><ul><li><a href='http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org'>VizSEC</a> - info@lists.vizsec.org</li><li><a href='http://www.infovis.org/mailman/listinfo/infovis'>Infovis</a> - infovis@infovis.org</li><li>FloCommunity mailing list - flocommunity@cert.org</li><li><a href='https://dlist.server.uni-frankfurt.de/mailman/listinfo/ifip-tc11'>IFIP TC 11</a> - ifip-tc11@dlist.uni-frankfurt.de</li><li><a href='http://research.cs.wisc.edu/dbworld/'>DBWorld</a></li><li><a href='https://lists.cs.columbia.edu/mailman/listinfo/tccc'>IEEE ComSoc Technical Committee on Computer Communications</a></li><li>Spafford's list: ias-opportunities@cerias.purdue.edu</li></ul></section><section id="websites"><div class="page-header"><h2>Web Sites</h2></div><ul><li><a href='http://confcal.vrvis.at/'>VRVis</a> (email step@vrvis.at)</li><li><a href='http://www.infovis-wiki.net/'>Infovis-Wiki</a> (wiki)</li><li><a href='http://secviz.org/'>SecViz.org</a> (form)</li><li><a href='http://graphicsconferences.wikidot.com/upcoming-conferences/'>Computer Graphics Conferences Wiki</a> (email beovar at gmail.com to add conference)</li><li><a href='http://www.acm.org/conferences'>ACM</a> (form)</li><li><a href='http://www.computer.org/conferences/calendar.htm'>IEEE</a> (email calendar@computer.org)</li><li><a href='http://www.ieee-security.org/Calendar/submitting.html'>IEEE Cypher</a> (email cipher-cfp@ieee-security.org)</li><li><a href='http://www.usenix.org/events/links_to_other.html'>Usenix</a> (email other_events@usenix.org)</li><li><a href='http://www.iacr.org/events/submit.html'>International Association for Cryptologic Research Calendar</a> (form) </li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/roles.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Committee Roles</h1><p>Roles and Responsibilities for members of the organizing committee</p></header><section id="chair"><div class="page-header"><h2>Chair</h2></div><ul><li>Put together the Organizing Committee</li><li>Coordinate with event/organization that VizSec is co-locate with </li><li>Set up budget</li><li>Publicize on mailing lists, online calendars, blogs, social media</li><li>Bring in sponsors</li><li>Find a keynote speaker</li></ul></section><section id="programchair"><div class="page-header"><h2>Program Chair</h2></div><ul><li>Put together the Program Committee</li><li>Write Call for Papers</li><li>Set up reviewing site (<a href='http://www.easychair.org/'>easychair</a>)</li><li>Assign reviewers (at least 3 per paper)</li><li>Determine the accepted papers based on reviews</li><li>Notify authors of acceptance/rejection</li><li>Determine program schedule</li><li>Chair the program onsite</li></ul></section><section id="publicationchair"><div class="page-header"><h2>Publication Chair</h2></div><ul><li>Set up agreement with ACM for proceedings in the <a href='https://www.acm.org/publications/icp_series'>International Conference Proceedings Series</a>, including free access for two weeks prior</li><li>Get ISBN number</li><li>Get copyrights from authors for all accepted papers</li><li>Provide copyright block for papers to authors</li><li>Collect camera ready papers from authors</li><li>Check formatting of papers, fix minor issues, communicate to authors</li><li>Generate frontmatter for proceedings <a href='https://www.acm.org/publications/icps-instructions/'>(instructions)</a></li><li>Send papers on to ACM</li></ul></section><section id="webmaster"><div class="page-header"><h2>Webmaster</h2></div><ul><li>Update site with organizing and program committee</li><li>Update site with CFP</li><li>Update site with program schedule</li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>Committee Roles</h1><p>Roles and Responsibilities for members of the organizing committee</p></header><section id="chair"><div class="page-header"><h2>Chair</h2></div><ul><li>Put together the Organizing Committee</li><li>Coordinate with event/organization that VizSec is co-locate with </li><li>Set up budget</li><li>Publicize on mailing lists, online calendars, blogs, social media</li><li>Bring in sponsors</li><li>Find a keynote speaker</li></ul></section><section id="programchair"><div class="page-header"><h2>Program Chair</h2></div><ul><li>Put together the Program Committee</li><li>Write Call for Papers</li><li>Set up reviewing site (<a href='http://www.easychair.org/'>easychair</a>)</li><li>Assign reviewers (at least 3 per paper)</li><li>Determine the accepted papers based on reviews</li><li>Notify authors of acceptance/rejection</li><li>Determine program schedule</li><li>Chair the program onsite</li></ul></section><section id="publicationchair"><div class="page-header"><h2>Publication Chair</h2></div><ul><li>Set up agreement with ACM for proceedings in the <a href='https://www.acm.org/publications/icp_series'>International Conference Proceedings Series</a>, including free access for two weeks prior</li><li>Get ISBN number</li><li>Get copyrights from authors for all accepted papers</li><li>Provide copyright block for papers to authors</li><li>Collect camera ready papers from authors</li><li>Check formatting of papers, fix minor issues, communicate to authors</li><li>Generate frontmatter for proceedings <a href='https://www.acm.org/publications/icps-instructions/'>(instructions)</a></li><li>Send papers on to ACM</li></ul></section><section id="webmaster"><div class="page-header"><h2>Webmaster</h2></div><ul><li>Update site with organizing and program committee</li><li>Update site with CFP</li><li>Update site with program schedule</li></ul></section><footer><p>last modified on: April 26, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/vizsec2010/index.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2010<small> Symposium on Visualization for Cyber Security</small></h1><p>September 14, 2010 &nbsp; / &nbsp; Ottawa, Ontario, Canada</p><p>In conjunction with <a href="http://www.raid-symposium.org/raid2010/">RAID</a></p></header><section id="welcome"><div class="page-header"><h2>Welcome to VizSec 2010</h2></div><p>The 7th International Symposium on Visualization for Cyber Security (VizSec) was held in the heart of downtown Ottawa, Ontario, Canada, September 14, 2010. This symposium brought together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques. The keynote speaker was Richard Bejtlich.</p><p>VizSec was held in conjunction with the 13th International Symposium on Recent Advances in Intrusion Detection (RAID) September 15 - 17, 2010 and with a Technology Watch - Real World Problems Driving Cyber Security Research September 15, 2010.</p><p>Thanks</p><p>The Organizing Committees of <a href='http://www.raid-symposium.org/raid2010/'>RAID 2010</a>, VizSec 2010 and Technology Watch would like to thank all authors, speakers, poster presenters, committee members and attendees who contributed to the success of these events. We hope that we will see you again at the future editions of these events.</p></section><section id="program"><div class="page-header"><h2>Program</h2></div><h3>Papers</h3><dl class="paper-list"><dt>Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer</dt><dd>"EMBER: A Global Perspective on Extreme Malicious Behavior" <a href='../files/Tamara Yu.pdf'>slides</a></dd><dt>Jeffrey Guenther, Fred Volk and Mark Shaneck</dt><dd>"Proposing a Multi-touch Interface for Intrusion Detection Environments" <a href='../files/Jeffrey Guenther.pptx'>slides</a></dd><dt>Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster and Stephen Boyer</dt><dd>"Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR" <a href='../files/Matthew Chu.pptx'>slides</a></dd><dt>John R. Goodall, Hassan Radwan, Lenny Halseth</dt><dd>"Visual Analysis of Code Security" <a href='../files/John Goodall.pdf'>slides</a></dd><dt>Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy and Thomas Engel</dt><dd>"PeekKernelFlows: Peeking into IP flows" <a href='../files/Gerard Wagener.pdf'>slides</a></dd><dt>Eduard Glatz</dt><dd>"Visualizing Host Traffic through Graphs" <a href='../files/Eduard Glatz.pdf'>slides</a></dd><dt>Michael Oehler, Dhananjay Phatak and John Krautheim</dt><dd>"Visualizing Your Key for Secure Phone Calls And Language Independence" <a href='../files/Michael Oehler.pdf'>slides</a></dd><dt>Qi Liao, Aaron Striegel and Nitesh Chawla</dt><dd>"Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management" <a href='../files/Qi Liao.pdf'>slides</a></dd><dt>Wilson Lian, Fabian Monrose and John McHugh</dt><dd>"Traffic Classification Using Visual Motifs: An Empirical Evaluation" <a href='../files/Wilson Lian.pdf'>slides</a></dd><dt>Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne and William Pike</dt><dd>"Real-Time Visualization of Network Behaviors for Situational Awareness" <a href='../files/Daniel Best.pdf'>slides</a></dd><dt>Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang and Xintao Wu</dt><dd>"Interactive Detection of Network Anomalies via Coordinated Multiple Views" <a href='../files/Lane Harrison.pdf'>slides</a></dd><dt>Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen and John Patterson</dt><dd>"Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations" <a href='../files/Jamie Rasmussen.ppt'>slides</a></dd></dl><h3>Posters</h3><dl class="paper-list"><dt>Robert Ferris and John Goodall</dt><dd>"A Visual Query Builder: Simplifying Data Selection" <a href='../files/Robert Ferris - poster.pdf'>poster</a> | <a href='../files/Robert Ferris - abstract.pdf'>abstract</a></dd><dt>Jeff Wilson and Robert Biddle</dt><dd>"Collaborative Multitouch Log Browsing" <a href='../files/Jeff Wilson - poster.pdf'>poster</a> | <a href='../files/Jeff Wilson - abstract.pdf'>abstract</a></dd><dt>Jake Spitzer and Cal Singh</dt><dd>"Graphical Passwords Using Google Maps" <a href='../files/Jake Spitzer - abstract.txt'>abstract</a></dd><dt>Steven Glowacki and Joshua Gminski</dt><dd>"Detecting Cloned Portions of Images" <a href='../files/Joshua Gminski - poster.ppt'>poster</a> | <a href='../files/Joshua Gminski - abstract.txt'>abstract</a></dd><dt>Serguei Mokhov, Joey Paquet and Mourad Debbabi</dt><dd>"The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY" <a href='../files/Serguei Mokhov - poster.pdf'>poster</a> | <a href='http://arxiv.org/abs/1009.5423'>abstract</a></dd></dl><h3>Keynote Speaker</h3><h4>Richard Bejtlich - Is Security Visualization Useful in Production?</h4><p>Is there is a disconnect between security visualization in theory and practice? In this keynote, Richard Bejtlich discussed the strengths and weaknesses of using security visualization in the enterprise. For example, why do analysts consistently refer to traditional displays, despite nearly ten years of work in the visualization arena? Why are most security products so limited when rendering data? What must be done to change this situation? Richard explored these topics based on experiences as Principal Technologist and Director of Incident Response for General Electric.</p><p><a href='http://taosecurity.blogspot.com/'>Richard Bejtlich</a> is Director of Incident Response for General Electric, and serves as Principal Technologist for GE's Global Infrastructure Services division. Prior to GE, Richard operated TaoSecurity LLC as an independent consultant, protected national security interests for ManTech Corporation's Computer Forensics and Intrusion Analysis division, investigated intrusions as part of Foundstone's incident response team, and monitored client networks for Ball Corporation. Richard began his digital security career as a military intelligence officer at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. He wrote "The Tao of Network Security Monitoring" and "Extrusion Detection", and co-authored "Real Digital Forensics". He also writes for his blog (<a href='http://taosecurity.blogspot.com/'>taosecurity.blogspot.com</a>) and <a href='http://techtarget.com/'>TechTarget.com</a>, and teaches for Black Hat.</p></section><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners in information visualization and cyber security to address the specific needs of the cyber security community through new and insightful visualization techniques. Co-located this year with the Symposium on Recent Advances in Intrusion Detection (RAID), the 7th VizSec will continue to provide opportunities for the two communities to collaborate and share insights into providing solutions for security needs through visualization approaches. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>This year our focus is on understanding what makes effective visual interfaces for different cyber security tasks. This involves both advancing our understanding of what cyber security tasks are, and improving our understanding of what it means for a security visualization to be effective. Cyber security visualization tasks cover a wide range, including (but not limited to) acquiring situational awareness in massive datasets; analyzing data from disparate sources during incident handling; producing actionable reports for others; modelling the behaviour of systems; and predicting future events. Understanding the effectiveness of a cyber security visualization is not limited only to the usability of the interface itself, but, perhaps even more importantly, to the assessment of how the visualization advances security goals. Barriers confronting current researchers include understanding the tasks where visualization can be effective, concerns about available data for both usability and effectiveness assessment, lack of a common agreement about what constitutes sound experimental design, and the difficulties of measuring the relative effectiveness of security visualizations in practice. Additionally, discussions at VizSec 2009 raised the question about what role a science-based approach ought to play in the conjunction of visualization and security. While many researchers are making progress in these and other critical areas, much work remains.</p><h3>Technical Papers</h3><p>Full and short papers, poster abstracts and panel abstracts offering novel contributions in security visualization are solicited. Papers may present technique, applications, practical experience, theory, or experiments and evaluations. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. We encourage papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including how visualization applies to:</p><ul><li>Situational awareness/understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Recording and reporting results of investigation</li><li>Modelling system and network behaviour</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Predicting future attacks or targets</li><li>Evaluation/user testing of VizSec systems</li><li>Lessons learned</li><li>Privacy considerations for managing VizSec data</li></ul><p>Accepted papers and abstracts will appear in the ACM Digital Library. The program committee will select an accepted paper to receive the VizSec 2010 best paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p></section><section id="hot"><div class="page-header"><h2>Venue</h2></div><p>The VizSec symposium was held at <a href='http://www.marriott.com/hotels/travel/yowmc?groupCode=DRDDRDA&app=resvlink&fromDate=9/13/10&toDate=9/17/10'>The Ottawa Marriott Hotel</a>, 100 Kent Street, Ottawa, Ontario K1P 5R7 Canada. Phone: 613-238-1122 / Toll-free: 1-800-853-8463.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>John Gerth, Stanford University</dd><dt>Program Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Publications Chair</dt><dd>John Goodall, Secure Decisions division of Applied Visions Inc.</dd><dt>Local Chair</dt><dd>Grant Vandenberghe, Defence Research and Development Canada</dd><dt>Local Co-Chair</dt><dd>Frédéric Massicotte, Communications Research Centre Canada</dd><dt>Emeritus Chair</dt><dd>Deb Frincke, Pacific Northwest National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>Richard Bejtlich, General Electric</li><li>David Barrera, Carleton University</li><li>Carter Bullard, QoSient, LLC</li><li>Bill Cheswick, AT&amp;T Research</li><li>Marc Dacier, Symantec Research Labs</li><li>Ron Dilley, Warner Bros.</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Utah State University</li><li>Carrie Gates, CA Labs</li><li>Joel Glanfield, Dalhousie University</li><li>Warren Harrop, Swinburne University of Technology</li><li>Aidong Lu, UNC Charlotte</li><li>Florian Mansmann, University of Konstanz</li><li>Raffael Marty, Loggly</li><li>Jan Monsch, Google</li><li>Stephen North, AT&amp;T</li><li>Danny Quist, Offensive Computing</li><li>Mike Sips, Max Planck Institut Informatik </li><li>Teryl Taylor, University of North Carolina</li><li>Joanne Treurniet, Defense Research and Development, Canada </li><li>Rick Wesson, Support Intelligence</li><li>Kirsten Whitley, Department of Defense</li><li>Pak Chung Wong, Pacific National Laboratory</li><li>Anatoly Yelizarov, Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li></ul></section><section id="sponsor"><div class="page-header"><h2>Sponsors</h2></div><h3>National Information Assurance Research Laboratory</h3><h3>Secure Decisions</h3></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2010<small> Symposium on Visualization for Cyber Security</small></h1><p>September 14, 2010 &nbsp; / &nbsp; Ottawa, Ontario, Canada</p><p>In conjunction with <a href="http://www.raid-symposium.org/raid2010/">RAID</a></p></header><section id="welcome"><div class="page-header"><h2>Welcome to VizSec 2010</h2></div><p>The 7th International Symposium on Visualization for Cyber Security (VizSec) was held in the heart of downtown Ottawa, Ontario, Canada, September 14, 2010. This symposium brought together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques. The keynote speaker was Richard Bejtlich.</p><p>VizSec was held in conjunction with the 13th International Symposium on Recent Advances in Intrusion Detection (RAID) September 15 - 17, 2010 and with a Technology Watch - Real World Problems Driving Cyber Security Research September 15, 2010.</p><p>Thanks</p><p>The Organizing Committees of <a href='http://www.raid-symposium.org/raid2010/'>RAID 2010</a>, VizSec 2010 and Technology Watch would like to thank all authors, speakers, poster presenters, committee members and attendees who contributed to the success of these events. We hope that we will see you again at the future editions of these events.</p></section><section id="program"><div class="page-header"><h2>Program</h2></div><h3>Papers</h3><dl class="paper-list"><dt>Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer</dt><dd>"EMBER: A Global Perspective on Extreme Malicious Behavior" <a href='../files/Tamara Yu.pdf'>slides</a></dd><dt>Jeffrey Guenther, Fred Volk and Mark Shaneck</dt><dd>"Proposing a Multi-touch Interface for Intrusion Detection Environments" <a href='../files/Jeffrey Guenther.pptx'>slides</a></dd><dt>Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster and Stephen Boyer</dt><dd>"Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR" <a href='../files/Matthew Chu.pptx'>slides</a></dd><dt>John R. Goodall, Hassan Radwan, Lenny Halseth</dt><dd>"Visual Analysis of Code Security" <a href='../files/John Goodall.pdf'>slides</a></dd><dt>Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy and Thomas Engel</dt><dd>"PeekKernelFlows: Peeking into IP flows" <a href='../files/Gerard Wagener.pdf'>slides</a></dd><dt>Eduard Glatz</dt><dd>"Visualizing Host Traffic through Graphs" <a href='../files/Eduard Glatz.pdf'>slides</a></dd><dt>Michael Oehler, Dhananjay Phatak and John Krautheim</dt><dd>"Visualizing Your Key for Secure Phone Calls And Language Independence" <a href='../files/Michael Oehler.pdf'>slides</a></dd><dt>Qi Liao, Aaron Striegel and Nitesh Chawla</dt><dd>"Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management" <a href='../files/Qi Liao.pdf'>slides</a></dd><dt>Wilson Lian, Fabian Monrose and John McHugh</dt><dd>"Traffic Classification Using Visual Motifs: An Empirical Evaluation" <a href='../files/Wilson Lian.pdf'>slides</a></dd><dt>Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne and William Pike</dt><dd>"Real-Time Visualization of Network Behaviors for Situational Awareness" <a href='../files/Daniel Best.pdf'>slides</a></dd><dt>Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang and Xintao Wu</dt><dd>"Interactive Detection of Network Anomalies via Coordinated Multiple Views" <a href='../files/Lane Harrison.pdf'>slides</a></dd><dt>Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen and John Patterson</dt><dd>"Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations" <a href='../files/Jamie Rasmussen.ppt'>slides</a></dd></dl><h3>Posters</h3><dl class="paper-list"><dt>Robert Ferris and John Goodall</dt><dd>"A Visual Query Builder: Simplifying Data Selection" <a href='../files/Robert Ferris - poster.pdf'>poster</a> | <a href='../files/Robert Ferris - abstract.pdf'>abstract</a></dd><dt>Jeff Wilson and Robert Biddle</dt><dd>"Collaborative Multitouch Log Browsing" <a href='../files/Jeff Wilson - poster.pdf'>poster</a> | <a href='../files/Jeff Wilson - abstract.pdf'>abstract</a></dd><dt>Jake Spitzer and Cal Singh</dt><dd>"Graphical Passwords Using Google Maps" <a href='../files/Jake Spitzer - abstract.txt'>abstract</a></dd><dt>Steven Glowacki and Joshua Gminski</dt><dd>"Detecting Cloned Portions of Images" <a href='../files/Joshua Gminski - poster.ppt'>poster</a> | <a href='../files/Joshua Gminski - abstract.txt'>abstract</a></dd><dt>Serguei Mokhov, Joey Paquet and Mourad Debbabi</dt><dd>"The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY" <a href='../files/Serguei Mokhov - poster.pdf'>poster</a> | <a href='http://arxiv.org/abs/1009.5423'>abstract</a></dd></dl><h3>Keynote Speaker</h3><h4>Richard Bejtlich - Is Security Visualization Useful in Production?</h4><p>Is there is a disconnect between security visualization in theory and practice? In this keynote, Richard Bejtlich discussed the strengths and weaknesses of using security visualization in the enterprise. For example, why do analysts consistently refer to traditional displays, despite nearly ten years of work in the visualization arena? Why are most security products so limited when rendering data? What must be done to change this situation? Richard explored these topics based on experiences as Principal Technologist and Director of Incident Response for General Electric.</p><p><a href='http://taosecurity.blogspot.com/'>Richard Bejtlich</a> is Director of Incident Response for General Electric, and serves as Principal Technologist for GE's Global Infrastructure Services division. Prior to GE, Richard operated TaoSecurity LLC as an independent consultant, protected national security interests for ManTech Corporation's Computer Forensics and Intrusion Analysis division, investigated intrusions as part of Foundstone's incident response team, and monitored client networks for Ball Corporation. Richard began his digital security career as a military intelligence officer at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. He wrote "The Tao of Network Security Monitoring" and "Extrusion Detection", and co-authored "Real Digital Forensics". He also writes for his blog (<a href='http://taosecurity.blogspot.com/'>taosecurity.blogspot.com</a>) and <a href='http://techtarget.com/'>TechTarget.com</a>, and teaches for Black Hat.</p></section><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners in information visualization and cyber security to address the specific needs of the cyber security community through new and insightful visualization techniques. Co-located this year with the Symposium on Recent Advances in Intrusion Detection (RAID), the 7th VizSec will continue to provide opportunities for the two communities to collaborate and share insights into providing solutions for security needs through visualization approaches. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>This year our focus is on understanding what makes effective visual interfaces for different cyber security tasks. This involves both advancing our understanding of what cyber security tasks are, and improving our understanding of what it means for a security visualization to be effective. Cyber security visualization tasks cover a wide range, including (but not limited to) acquiring situational awareness in massive datasets; analyzing data from disparate sources during incident handling; producing actionable reports for others; modelling the behaviour of systems; and predicting future events. Understanding the effectiveness of a cyber security visualization is not limited only to the usability of the interface itself, but, perhaps even more importantly, to the assessment of how the visualization advances security goals. Barriers confronting current researchers include understanding the tasks where visualization can be effective, concerns about available data for both usability and effectiveness assessment, lack of a common agreement about what constitutes sound experimental design, and the difficulties of measuring the relative effectiveness of security visualizations in practice. Additionally, discussions at VizSec 2009 raised the question about what role a science-based approach ought to play in the conjunction of visualization and security. While many researchers are making progress in these and other critical areas, much work remains.</p><h3>Technical Papers</h3><p>Full and short papers, poster abstracts and panel abstracts offering novel contributions in security visualization are solicited. Papers may present technique, applications, practical experience, theory, or experiments and evaluations. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. We encourage papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including how visualization applies to:</p><ul><li>Situational awareness/understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Recording and reporting results of investigation</li><li>Modelling system and network behaviour</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Predicting future attacks or targets</li><li>Evaluation/user testing of VizSec systems</li><li>Lessons learned</li><li>Privacy considerations for managing VizSec data</li></ul><p>Accepted papers and abstracts will appear in the ACM Digital Library. The program committee will select an accepted paper to receive the VizSec 2010 best paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p></section><section id="hot"><div class="page-header"><h2>Venue</h2></div><p>The VizSec symposium was held at <a href='http://www.marriott.com/hotels/travel/yowmc?groupCode=DRDDRDA&app=resvlink&fromDate=9/13/10&toDate=9/17/10'>The Ottawa Marriott Hotel</a>, 100 Kent Street, Ottawa, Ontario K1P 5R7 Canada. Phone: 613-238-1122 / Toll-free: 1-800-853-8463.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>John Gerth, Stanford University</dd><dt>Program Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Publications Chair</dt><dd>John Goodall, Secure Decisions division of Applied Visions Inc.</dd><dt>Local Chair</dt><dd>Grant Vandenberghe, Defence Research and Development Canada</dd><dt>Local Co-Chair</dt><dd>Frédéric Massicotte, Communications Research Centre Canada</dd><dt>Emeritus Chair</dt><dd>Deb Frincke, Pacific Northwest National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>Richard Bejtlich, General Electric</li><li>David Barrera, Carleton University</li><li>Carter Bullard, QoSient, LLC</li><li>Bill Cheswick, AT&amp;T Research</li><li>Marc Dacier, Symantec Research Labs</li><li>Ron Dilley, Warner Bros.</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Utah State University</li><li>Carrie Gates, CA Labs</li><li>Joel Glanfield, Dalhousie University</li><li>Warren Harrop, Swinburne University of Technology</li><li>Aidong Lu, UNC Charlotte</li><li>Florian Mansmann, University of Konstanz</li><li>Raffael Marty, Loggly</li><li>Jan Monsch, Google</li><li>Stephen North, AT&amp;T</li><li>Danny Quist, Offensive Computing</li><li>Mike Sips, Max Planck Institut Informatik </li><li>Teryl Taylor, University of North Carolina</li><li>Joanne Treurniet, Defense Research and Development, Canada </li><li>Rick Wesson, Support Intelligence</li><li>Kirsten Whitley, Department of Defense</li><li>Pak Chung Wong, Pacific National Laboratory</li><li>Anatoly Yelizarov, Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li></ul></section><section id="sponsor"><div class="page-header"><h2>Sponsors</h2></div><h3>National Information Assurance Research Laboratory</h3><h3>Secure Decisions</h3></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  deploy/vizsec2011/index.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2011<small> Symposium on Visualization for Cyber Security</small></h1><p>July 20, 2011 &nbsp; / &nbsp; Pittsburgh, PA, USA</p><p>In conjunction with <a href="http://cups.cs.cmu.edu/soups/">SOUPS</a></p></header><section id="welcome"><div class="page-header"><h2>Welcome to VizSec 2011</h2></div><p>The 8th International Symposium on Visualization for Cyber Security will be held</p><at>Carnegie Mellon University from July 20, 2011.</at><p>VizSec brings researchers and practitioners from academia, government, and industry to share insights and present solutions to modern cyber security challenges using visualization techniques. Technical papers, speakers, and presentations are featured in this year's program.</p><p>VizSec will be held in conjunction with <a href='http://cups.cs.cmu.edu/soups/2011/'>Symposium on Usable Privacy and Security (SOUPS)</a>.</p></section><section id="program"><div class="page-header"><h2>Program</h2></div><h3>Papers</h3><dl class="paper-list"><dt>Alberto Boschetti, Chris Muelder, Luca Salgareldt and Kwan-Liu Ma</dt><dd>"TVi: A Visual Querying System for Network Monitoring and Anomaly Detection"</dd><dt>Lakshmanan Nataraj, Karthikeyan Shanmugavadivel, Gregoire Jacob and B.S Manjunath</dt><dd>"Malware Images: Visuadtzation and Automatic Classification"</dd><dt>Francesco Roveta, Luca Di Mario, Federico Maggi, Giorgio Cavigdta, Stefano Zanero and Paolo Ciuccareldt</dt><dd>"BURN: Baring Unknown Rogue Networks" (<strong>Best Paper Award</strong>)</dd><dt>Christopher Kintzel, Johannes Fuchs and Florian Mansmann</dt><dd>"Monitoring Large IP Spaces with ClockView"</dd><dt>Chris Horn and Anita D'Amico</dt><dd>"Visual Analysis of Goal-Directed Network Defense Decisions"</dd><dt>Ankit Singh, Alex Endert, Lauren Bradel, Christopher Andrews, Chris North and Robert Kincaid</dt><dd>"Using Large Displays for Live Visual History of Cyber-security Analytic Process"</dd></dl><h3>Keynote Speaker</h3><h4>Lorrie Cranor</h4><p>Carnegie Mellon University</p><p>Lorrie Faith Cranor is an Associate Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University where she is director of the CyLab Usable Privacy and Security Laboratory (CUPS). She is also Chief Scientist of Wombat Security Technologies, Inc. She has authored over 100 research papers on online privacy, usable security, phishing, spam, electronic voting, anonymous publishing, and other topics.</p><p>She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability (O'Reilly 2005) and founded the Symposium On Usable Privacy and Security (SOUPS). She also chaired the Platform for Privacy Preferences Project (P3P) Specification Working Group at the W3C and authored the book Web Privacy with P3P (O'Reilly 2002). She has served on a number of boards, including the Electronic Frontier Foundation Board of Directors, and on the editorial boards of several journals. In 2003 she was named one of the top 100 innovators 35 or younger by Technology Review magazine. She was previously a researcher at AT&T-Labs Research and taught in the Stern School of Business at New York University.</p><p>Please visit her <a href='http://lorrie.cranor.org/'>personal website</a> for more information.</p><h3>Closing Speaker</h3><h4>Simson Garfinkel</h4><p>Naval Postgraduate School</p><p>Simson L. Garfinkel is an Associate Professor at the Naval Postgraduate School in Monterey, California. His research interests include computer forensics, the emerging field of usability and security, personal information management, privacy, information policy and terrorism. He holds six US patents for his computer-related research and has published dozens of journal and conference papers in security and computer forensics.</p><p>Garfinkel is the author or co-author of fourteen books on computing. He is perhaps best known for his book Database Nation: The Death of Privacy in the 21st Century. Garfinkel's most successful book, Practical UNIX and Internet Security (co-authored with Gene Spafford), has sold more than 250,000 copies and been translated into more than a dozen languages since the first edition was published in 1991.</p><p>Garfinkel is also a journalist and has written more than a thousand articles about science, technology, and technology policy in the popular press since 1983. He started writing about identity theft in 1988. He has won numerous national journalism awards, including the Jesse H. Neal National Business Journalism Award two years in a row for his "Machine shop" series in CSO magazine. Today he mostly writes for Technology Review Magazine and the technologyreview.com website.</p><p>As an entrepreneur, Garfinkel founded five companies between 1989 and 2000. Two of the most successful were Vineyard.NET, which provided Internet service on Martha's Vineyard to more than a thousand customers from 1995 through 2005, and Sandstorm Enterprises, an early developer of commercial computer forensic tools.</p><p>Garfinkel received three Bachelor of Science degrees from MIT in 1987, a Master's of Science in Journalism from Columbia University in 1988, and a Ph.D. in Computer Science from MIT in 2005.</p><h3>Panel</h3><dl><dt>Weichao Wang, Lane Harrison, Danny Quist, Jonathan Maletic, Robert Erbacher</dt><dd>"Visual Analytics and Automatic Detection Methods"</dd></dl></section><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with the <a href='http://cups.cs.cmu.edu/soups/2011/'>Symposium on Usable Privacy and Security (SOUPS)</a>, the 8th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the <a href='http://portal.acm.org/'>ACM Digital Library</a> as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. This year our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing “user assisted†attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rulesets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full paper and panel abstracts offering novel contributions in security visualization are solicited. Papers may present technique, applications, practical experience, theory, or experiments and evaluations. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. We encourage papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including how visualization applies to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><h3>Awards</h3><p>Accepted papers will appear in the ACM Digital Library. The program committee will select an accepted paper to receive the VizSec 2011 Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p></section><section id="hot"><div class="page-header"><h2>Venue</h2></div><p>VizSec 2011 was held on the campus of Carnegie Mellon University, one of the worlds premier research universities. CMU is located approximately 22 miles from the Pittsburgh International Airport.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Greg Conti, US Military Academy at West Point</dd><dt>Program Chair</dt><dd>Tamara Yu, MIT Lincoln Laboratory</dd><dt>Publications Chair</dt><dd>Marc Abbott, US Military Academy at West Point</dd><dt>Publicity Chair</dt><dd>Anita D'Amico, Secure Decisions</dd><dt>Emeritus Chair</dt><dd>John Gerth, Stanford University</dd></dl><h4>Program Committee</h4><ul><li>Richard Bejtlich, General Electric</li><li>David Barrera, Carleton University</li><li>Carter Bullard, QoSient, LLC</li><li>Bill Cheswick, AT&amp;T Research</li><li>Michael Collins, Redjack</li><li>Ron Dilley, Warner Bros.</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Utah State University</li><li>Deborah Frincke, Pacific Northwest National Laboratory</li><li>Carrie Gates, CA Labs</li><li>John Goodall, Oak Ridge National Laboratory </li><li>Warren Harrop, Swinburne University of Technology</li><li>Florian Mansmann, University of Konstanz</li><li>Raffael Marty, Loggly</li><li>Jan Monsch, Google</li><li>Stephen North, AT&amp;T</li><li>Danny Quist, Offensive Computing</li><li>Mark Shaneck, Liberty University</li><li>Dennis Schweitzer, United States Air Force Academy </li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec Research Labs </li><li>Joanne Treurniet, Defense Research and Development, Canada </li><li>Seth Webster, MIT Lincoln Laboratory</li><li>Kirsten Whitley, Department of Defense</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li></ul></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="date" content=" + (modifyDate) + "><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/sci/vizsec/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/sci/vizsec" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/sci/vizsec/#cfp">Call for Papers</a></li><li><a href="/sci/vizsec/#sub">Submissions</a></li><li><a href="/sci/vizsec/#dat">Dates</a></li><li><a href="/sci/vizsec/#hot">Hotel</a></li><li><a href="/sci/vizsec/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/sci/vizsec/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/sci/vizsec/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2011<small> Symposium on Visualization for Cyber Security</small></h1><p>July 20, 2011 &nbsp; / &nbsp; Pittsburgh, PA, USA</p><p>In conjunction with <a href="http://cups.cs.cmu.edu/soups/">SOUPS</a></p></header><section id="welcome"><div class="page-header"><h2>Welcome to VizSec 2011</h2></div><p>The 8th International Symposium on Visualization for Cyber Security will be held</p><at>Carnegie Mellon University from July 20, 2011.</at><p>VizSec brings researchers and practitioners from academia, government, and industry to share insights and present solutions to modern cyber security challenges using visualization techniques. Technical papers, speakers, and presentations are featured in this year's program.</p><p>VizSec will be held in conjunction with <a href='http://cups.cs.cmu.edu/soups/2011/'>Symposium on Usable Privacy and Security (SOUPS)</a>.</p></section><section id="program"><div class="page-header"><h2>Program</h2></div><h3>Papers</h3><dl class="paper-list"><dt>Alberto Boschetti, Chris Muelder, Luca Salgareldt and Kwan-Liu Ma</dt><dd>"TVi: A Visual Querying System for Network Monitoring and Anomaly Detection"</dd><dt>Lakshmanan Nataraj, Karthikeyan Shanmugavadivel, Gregoire Jacob and B.S Manjunath</dt><dd>"Malware Images: Visuadtzation and Automatic Classification"</dd><dt>Francesco Roveta, Luca Di Mario, Federico Maggi, Giorgio Cavigdta, Stefano Zanero and Paolo Ciuccareldt</dt><dd>"BURN: Baring Unknown Rogue Networks" (<strong>Best Paper Award</strong>)</dd><dt>Christopher Kintzel, Johannes Fuchs and Florian Mansmann</dt><dd>"Monitoring Large IP Spaces with ClockView"</dd><dt>Chris Horn and Anita D'Amico</dt><dd>"Visual Analysis of Goal-Directed Network Defense Decisions"</dd><dt>Ankit Singh, Alex Endert, Lauren Bradel, Christopher Andrews, Chris North and Robert Kincaid</dt><dd>"Using Large Displays for Live Visual History of Cyber-security Analytic Process"</dd></dl><h3>Keynote Speaker</h3><h4>Lorrie Cranor</h4><p>Carnegie Mellon University</p><p>Lorrie Faith Cranor is an Associate Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University where she is director of the CyLab Usable Privacy and Security Laboratory (CUPS). She is also Chief Scientist of Wombat Security Technologies, Inc. She has authored over 100 research papers on online privacy, usable security, phishing, spam, electronic voting, anonymous publishing, and other topics.</p><p>She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability (O'Reilly 2005) and founded the Symposium On Usable Privacy and Security (SOUPS). She also chaired the Platform for Privacy Preferences Project (P3P) Specification Working Group at the W3C and authored the book Web Privacy with P3P (O'Reilly 2002). She has served on a number of boards, including the Electronic Frontier Foundation Board of Directors, and on the editorial boards of several journals. In 2003 she was named one of the top 100 innovators 35 or younger by Technology Review magazine. She was previously a researcher at AT&T-Labs Research and taught in the Stern School of Business at New York University.</p><p>Please visit her <a href='http://lorrie.cranor.org/'>personal website</a> for more information.</p><h3>Closing Speaker</h3><h4>Simson Garfinkel</h4><p>Naval Postgraduate School</p><p>Simson L. Garfinkel is an Associate Professor at the Naval Postgraduate School in Monterey, California. His research interests include computer forensics, the emerging field of usability and security, personal information management, privacy, information policy and terrorism. He holds six US patents for his computer-related research and has published dozens of journal and conference papers in security and computer forensics.</p><p>Garfinkel is the author or co-author of fourteen books on computing. He is perhaps best known for his book Database Nation: The Death of Privacy in the 21st Century. Garfinkel's most successful book, Practical UNIX and Internet Security (co-authored with Gene Spafford), has sold more than 250,000 copies and been translated into more than a dozen languages since the first edition was published in 1991.</p><p>Garfinkel is also a journalist and has written more than a thousand articles about science, technology, and technology policy in the popular press since 1983. He started writing about identity theft in 1988. He has won numerous national journalism awards, including the Jesse H. Neal National Business Journalism Award two years in a row for his "Machine shop" series in CSO magazine. Today he mostly writes for Technology Review Magazine and the technologyreview.com website.</p><p>As an entrepreneur, Garfinkel founded five companies between 1989 and 2000. Two of the most successful were Vineyard.NET, which provided Internet service on Martha's Vineyard to more than a thousand customers from 1995 through 2005, and Sandstorm Enterprises, an early developer of commercial computer forensic tools.</p><p>Garfinkel received three Bachelor of Science degrees from MIT in 1987, a Master's of Science in Journalism from Columbia University in 1988, and a Ph.D. in Computer Science from MIT in 2005.</p><h3>Panel</h3><dl><dt>Weichao Wang, Lane Harrison, Danny Quist, Jonathan Maletic, Robert Erbacher</dt><dd>"Visual Analytics and Automatic Detection Methods"</dd></dl></section><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with the <a href='http://cups.cs.cmu.edu/soups/2011/'>Symposium on Usable Privacy and Security (SOUPS)</a>, the 8th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the <a href='http://portal.acm.org/'>ACM Digital Library</a> as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. This year our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing “user assisted†attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rulesets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full paper and panel abstracts offering novel contributions in security visualization are solicited. Papers may present technique, applications, practical experience, theory, or experiments and evaluations. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application. We encourage papers that report results on visualization techniques and systems in solving all aspects of cyber security problems, including how visualization applies to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><h3>Awards</h3><p>Accepted papers will appear in the ACM Digital Library. The program committee will select an accepted paper to receive the VizSec 2011 Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p></section><section id="hot"><div class="page-header"><h2>Venue</h2></div><p>VizSec 2011 was held on the campus of Carnegie Mellon University, one of the worlds premier research universities. CMU is located approximately 22 miles from the Pittsburgh International Airport.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Greg Conti, US Military Academy at West Point</dd><dt>Program Chair</dt><dd>Tamara Yu, MIT Lincoln Laboratory</dd><dt>Publications Chair</dt><dd>Marc Abbott, US Military Academy at West Point</dd><dt>Publicity Chair</dt><dd>Anita D'Amico, Secure Decisions</dd><dt>Emeritus Chair</dt><dd>John Gerth, Stanford University</dd></dl><h4>Program Committee</h4><ul><li>Richard Bejtlich, General Electric</li><li>David Barrera, Carleton University</li><li>Carter Bullard, QoSient, LLC</li><li>Bill Cheswick, AT&amp;T Research</li><li>Michael Collins, Redjack</li><li>Ron Dilley, Warner Bros.</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Utah State University</li><li>Deborah Frincke, Pacific Northwest National Laboratory</li><li>Carrie Gates, CA Labs</li><li>John Goodall, Oak Ridge National Laboratory </li><li>Warren Harrop, Swinburne University of Technology</li><li>Florian Mansmann, University of Konstanz</li><li>Raffael Marty, Loggly</li><li>Jan Monsch, Google</li><li>Stephen North, AT&amp;T</li><li>Danny Quist, Offensive Computing</li><li>Mark Shaneck, Liberty University</li><li>Dennis Schweitzer, United States Air Force Academy </li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec Research Labs </li><li>Joanne Treurniet, Defense Research and Development, Canada </li><li>Seth Webster, MIT Lincoln Laboratory</li><li>Kirsten Whitley, Department of Defense</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li></ul></section><footer><p>last modified on: April 25, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a>, built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/sci/vizsec/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/sci/vizsec/js/bootstrap.min.js"></script></div></body>
View
2  source/includes/head.jade
@@ -4,7 +4,7 @@
//[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]
//[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]
head
- - var rootUrl = '';
+ - var rootUrl = '/sci/vizsec';
meta(charset="utf-8")
meta(http-equiv="X-UA-Compatible", content="IE=edge,chrome=1")
title VizSec
Please sign in to comment.
Something went wrong with that request. Please try again.