Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Browse files

updated mod date on home page

  • Loading branch information...
commit f6853aa7ac20147f9dfb071d43d79bd69a3e1ef2 1 parent 4d244be
@jgoodall jgoodall authored
Showing with 2 additions and 2 deletions.
  1. +1 −1  deploy/index.html
  2. +1 −1  source/templates/index.jade
View
2  deploy/index.html
@@ -1 +1 @@
-<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2012 <small class="hidden-phone"> Symposium on Visualization for Cyber Security</small></h1><h1 class="visible-phone"><small>Symposium on Visualization for Cyber Security</small></h1><p>October 14 or 15, 2012 <br class='visible-phone' /><span class='hidden-phone'>&nbsp; / &nbsp;</span> Seattle, WA, USA</p><p>In conjunction with <a href='http://visweek.org/'>VisWeek</a></p></header><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with VisWeek, the 9th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that have been demonstrated to be useful for improving cyber security practices, including but not limited to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><p>Accepted papers will appear in the ACM Digital Library two weeks prior to the conference. The program committee will select an accepted paper to receive the VizSec Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p><h3>Awards</h3><p>There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.</p><h3>Data</h3><p>If you do not have real-world data to demonstrate your visualization, you may be interested in looking at, and perhaps submitting an entry, for this year's <a href="http://www.vacommunity.org/VAST+Challenge+2012">VAST Challenge</a>. </p><p><a href="http://hcil.cs.umd.edu/localphp/hcil/vast11/index.php">Last year's challenge</a> also had cybersecurity data if you are looking for additional data.</p></section><section id="sub"><div class="page-header"><h2>Submissions</h2></div><h3>Papers</h3><p>Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.</p><h3>Paper Formatting</h3><p>The VizSec proceedings will be published by ACM. The <a href='https://www.acm.org/sigs/publications/proceedings-templates'> ACM SIG Proceedings Templates</a> provides Word and LaTeX templates. </p><p>Authors should apply <a href='https://www.acm.org/about/class/1998'>ACM Computing Classification categories and terms</a>. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.</p><h3>Submission</h3><p>Submit papers using EasyChair: <a href='http://www.easychair.org/conferences/?conf=vizsec2012'>http://www.easychair.org/conferences/?conf=vizsec2012</a></p></section><section id="dat"><div class="page-header"><h2>Dates</h2></div><dl class="dl-horizontal"><dt>July 1, 2012</dt><dd>Paper Submission</dd><dt>August 10, 2012</dt><dd>Author Notification</dd><dt>September 1, 2012</dt><dd>Camera Ready Submission and Copyright forms</dd><dt>October 1, 2012</dt><dd>Papers available in ACM Digital Library</dd><dt>October 14 or 15, 2012</dt><dd>VizSec</dd></dl></section><section id="hot"><div class="page-header"><h2>Hotel</h2></div><p>VizSec will be held in conjunction with <a href='http://visweek.org/'>VisWeek</a> at the <a href='http://www.sheratonseattle.com/'>Seattle Sheraton Hotel</a>. </p><p>See <a href='http://visweek.org/visweek/2012/info/registration/hotel-reservations'>the VisWeek hotel reservations page</a> for information about the conference room rate.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Program Chair</dt><dd>Daniel Quist, MIT Lincoln Laboratory</dd><dt>Publications Chair</dt><dd>John Goodall, Oak Ridge National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>David Barrera, Carleton University</li><li>Richard Bejtlich, TaoSecurity</li><li>Greg Conti, US Military Academy at West Point</li><li>Ron Dilley, UberAdmin</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Army Research Laboratory</li><li>Carrie Gates, CA Technologies</li><li>John Gerth, Stanford University</li><li>Mark Haselkorn, University of Washington</li><li>Tyler Hudak, KoreLogic Security</li><li>Kohlhammer J&ouml;rn, Fraunhofer IGD</li><li>Florian Mansmann, Universit&auml;t Konstanz</li><li>Raffael Marty, PixlCloud</li><li>Jan Monsch, Google</li><li>Joe Parry, Cambridge Intelligence</li><li>Stephen North, AT&amp;T</li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec</li><li>Joanne Treurniet, Defence Research and Development Canada</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li><li>Anatoly Yelizarov, Lomonosov Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li><li>Daniel Best, Pacific Northwest National Laboratory</li></ul></section><section id="con"><div class="page-header"><h2>Contact</h2></div><p>Email questions about VizSec 2012 to Dino Schweitzer: &nbsp; &nbsp; dino <span style='font-size:65%'>&lt; dot &gt;</span> schweitzer <span style='font-size:65%'>&lt; at &gt;</span> gmail <span style='font-size:65%'>&lt; dot &gt;</span> com </p></section><footer><p>last modified on: May 3, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a> / built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
+<!DOCTYPE html><!--[if lt IE 7 ]> <html class="no-js ie6 oldie" lang="en"> <![endif]--><!--[if IE 7 ]> <html class="no-js ie7 oldie" lang="en"> <![endif]--><!--[if IE 8 ]> <html class="no-js ie8 oldie" lang="en"> <![endif]--><!--[if (gte IE 9)|!(IE)]><!--> <html class="no-js" lang="en"> <!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>VizSec</title><meta name="description" content="VizSec Symposium on Visualization for Cyber Security"><meta name="keywords" content="vizsec, secvis, visualization, visualisation, InfoVis, Vis, Viz, Computer, Security, CyberSecurity, Security Visualization, conference, Symposium"><meta name="author" content="John Goodall"><meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"><link rel="stylesheet" href="/css/style.min.css"></head><body><div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a data-toggle="collapse" data-target=".nav-collapse" class="btn btn-navbar"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/" class="brand">VizSec </a><div class="nav-collapse"><ul class="nav"><li><a href="/#cfp">Call for Papers</a></li><li><a href="/#sub">Submissions</a></li><li><a href="/#dat">Dates</a></li><li><a href="/#hot">Hotel</a></li><li><a href="/#com">Committee</a></li></ul><ul class="nav pull-right"><li><a href="/past.html"><i class="icon-calendar icon-white"></i><span>&nbsp; Past Events</span></a></li><li><a href="http://lists.vizsec.org/mailman/listinfo/info_lists.vizsec.org"><i class="icon-envelope icon-white"></i><span>&nbsp; Mailing List</span></a></li><li><a href="/about.html"><i class="icon-info-sign icon-white"></i><span>&nbsp; About</span></a></li></ul></div></div></div></div><div class="container"><header class="hero-unit"><h1>VizSec 2012 <small class="hidden-phone"> Symposium on Visualization for Cyber Security</small></h1><h1 class="visible-phone"><small>Symposium on Visualization for Cyber Security</small></h1><p>October 14 or 15, 2012 <br class='visible-phone' /><span class='hidden-phone'>&nbsp; / &nbsp;</span> Seattle, WA, USA</p><p>In conjunction with <a href='http://visweek.org/'>VisWeek</a></p></header><section id="cfp"><div class="page-header"><h2>Call for Papers</h2></div><p>The International Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization techniques. Co-located this year with VisWeek, the 9th VizSec will provide new opportunities for the usability and visualization communities to collaborate and share insights on a broad range of security-related topics. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series.</p><p>Important research problems often lie at the intersection of disparate domains. Our focus is to explore effective, scalable visual interfaces for security domains, where visualization may provide a distinct benefit, including computer forensics, reverse engineering, insider threat detection, cryptography, privacy, preventing 'user assisted' attacks, compliance management, wireless security, secure coding, and penetration testing in addition to traditional network security. Human time and attention are precious resources. We are particularly interested in visualization and interaction techniques that effectively capture human analyst insights so that further processing may be handled by machines, freeing the analyst for other tasks. For example, a malware analyst might use a visualization system to analyze a new piece of malicious software and then facilitate generating a signature for future machine processing. When appropriate, research that incorporates multiple data sources, such as network packet captures, firewall rule sets and logs, DNS logs, web server logs, and/or intrusion detection system logs, is particularly desirable.</p><h3>Technical Papers</h3><p>Full papers offering novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, or experiments and evaluations. We encourage papers on technologies and methods that have been demonstrated to be useful for improving cyber security practices, including but not limited to:</p><ul><li>Situational awareness / understanding</li><li>Incident handling including triage, exploration, correlation, and response</li><li>Computer forensics</li><li>Recording and reporting results of investigation</li><li>Reverse engineering and malware analysis</li><li>Privacy</li><li>Multiple data source analysis</li><li>Analyzing information requirements for computer network defense</li><li>Evaluation / User testing of VizSec systems</li><li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</li><li>Modeling system and network behavior</li><li>Modeling attacker and defender behavior</li><li>Studying risk and impact of cyber attacks</li><li>Predicting future attacks or targets</li><li>Security metrics and education</li><li>Lessons learned</li></ul><p>Accepted papers will appear in the ACM Digital Library two weeks prior to the conference. The program committee will select an accepted paper to receive the VizSec Best Paper award. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper.</p><h3>Awards</h3><p>There will be an award for the best paper from the accepted program. The best paper award will be given to the paper judged to have the highest overall quality. A key element of the best paper selection process will be whether the results are believed to be repeatable by other scientists based on the algorithms and data provided in the paper. This award will be chosen by the program committee.</p><h3>Data</h3><p>If you do not have real-world data to demonstrate your visualization, you may be interested in looking at, and perhaps submitting an entry, for this year's <a href="http://www.vacommunity.org/VAST+Challenge+2012">VAST Challenge</a>. </p><p><a href="http://hcil.cs.umd.edu/localphp/hcil/vast11/index.php">Last year's challenge</a> also had cybersecurity data if you are looking for additional data.</p></section><section id="sub"><div class="page-header"><h2>Submissions</h2></div><h3>Papers</h3><p>Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference, preferably by themselves or by prior arrangement through a delegate.</p><h3>Paper Formatting</h3><p>The VizSec proceedings will be published by ACM. The <a href='https://www.acm.org/sigs/publications/proceedings-templates'> ACM SIG Proceedings Templates</a> provides Word and LaTeX templates. </p><p>Authors should apply <a href='https://www.acm.org/about/class/1998'>ACM Computing Classification categories and terms</a>. ACM invites authors to submit an image representation of their article. The image must be selected from the article body and can be any of the following: art, graphic, table, figures, etc. (Image files are to be as square as possible, 100x100 ppi and in jpg format.) Authors must supply a caption with the image. The caption length should be no more than 512 characters.</p><h3>Submission</h3><p>Submit papers using EasyChair: <a href='http://www.easychair.org/conferences/?conf=vizsec2012'>http://www.easychair.org/conferences/?conf=vizsec2012</a></p></section><section id="dat"><div class="page-header"><h2>Dates</h2></div><dl class="dl-horizontal"><dt>July 1, 2012</dt><dd>Paper Submission</dd><dt>August 10, 2012</dt><dd>Author Notification</dd><dt>September 1, 2012</dt><dd>Camera Ready Submission and Copyright forms</dd><dt>October 1, 2012</dt><dd>Papers available in ACM Digital Library</dd><dt>October 14 or 15, 2012</dt><dd>VizSec</dd></dl></section><section id="hot"><div class="page-header"><h2>Hotel</h2></div><p>VizSec will be held in conjunction with <a href='http://visweek.org/'>VisWeek</a> at the <a href='http://www.sheratonseattle.com/'>Seattle Sheraton Hotel</a>. </p><p>See <a href='http://visweek.org/visweek/2012/info/registration/hotel-reservations'>the VisWeek hotel reservations page</a> for information about the conference room rate.</p></section><section id="com"><div class="page-header"><h2>Committee</h2></div><dl><dt>General Chair</dt><dd>Dino Schweitzer, United States Air Force Academy</dd><dt>Program Chair</dt><dd>Daniel Quist, MIT Lincoln Laboratory</dd><dt>Publications Chair</dt><dd>John Goodall, Oak Ridge National Laboratory</dd></dl><h4>Program Committee</h4><ul><li>David Barrera, Carleton University</li><li>Richard Bejtlich, TaoSecurity</li><li>Greg Conti, US Military Academy at West Point</li><li>Ron Dilley, UberAdmin</li><li>David Ebert, Purdue University</li><li>Alex Endert, Virginia Tech</li><li>Rob Erbacher, Army Research Laboratory</li><li>Carrie Gates, CA Technologies</li><li>John Gerth, Stanford University</li><li>Mark Haselkorn, University of Washington</li><li>Tyler Hudak, KoreLogic Security</li><li>Kohlhammer J&ouml;rn, Fraunhofer IGD</li><li>Florian Mansmann, Universit&auml;t Konstanz</li><li>Raffael Marty, PixlCloud</li><li>Jan Monsch, Google</li><li>Joe Parry, Cambridge Intelligence</li><li>Stephen North, AT&amp;T</li><li>Teryl Taylor, University of North Carolina</li><li>Olivier Thonnard, Symantec</li><li>Joanne Treurniet, Defence Research and Development Canada</li><li>Pak Chung Wong, Pacific Northwest National Laboratory</li><li>Anatoly Yelizarov, Lomonosov Moscow State University</li><li>Tamara Yu, MIT Lincoln Laboratory</li><li>Daniel Best, Pacific Northwest National Laboratory</li></ul></section><section id="con"><div class="page-header"><h2>Contact</h2></div><p>Email questions about VizSec 2012 to Dino Schweitzer: &nbsp; &nbsp; dino <span style='font-size:65%'>&lt; dot &gt;</span> schweitzer <span style='font-size:65%'>&lt; at &gt;</span> gmail <span style='font-size:65%'>&lt; dot &gt;</span> com </p></section><footer><p>last modified on: May 9, 2012</p><p>site designed and maintained by <a href="http://www.ornl.gov/~ojg/">jgoodall</a> / built with <a href='http://twitter.github.com/bootstrap/'>bootstrap</a></p><p>content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a></p></footer><script src="//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.js"></script><script>window.jQuery || document.write(unescape('%3Cscript src="/js/libs/jquery-1.7.2.min.js"%3E%3C/script%3E'))</script><script src="/js/bootstrap.min.js"></script></div></body>
View
2  source/templates/index.jade
@@ -1,4 +1,4 @@
-- var modifyDate = 'May 3, 2012'
+- var modifyDate = 'May 9, 2012'
- var eventDate = 'October 14 or 15, 2012'
- var eventLocation = 'Seattle, WA, USA'
- var year = 2012
Please sign in to comment.
Something went wrong with that request. Please try again.