VizSEC 2008
Workshop on Visualization for Cyber Security
Cambridge, MA USA
September 15, 2008
In conjunction with RAID 2008

April 11, 2008 : Deadline for full paper submission
May 9, 2008 : Deadline for short paper submissions
July 18, 2008 : Deadline for poster and demo abstracts

The 5th International Workshop on Visualization for Cyber Security will
provide a forum for new research in visualization for computer security.
VizSec will be held in conjunction with the 11th International Symposium on
Recent Advances in Intrusion Detection (RAID).

As a result of previous VizSec workshops, we have seen both the application
of existing visualization techniques to security problems and the
development of novel security visualization approaches. However, VizSec
research has focused on helping human analysts to detect anomalies and
patterns, particularly in computer network defense. Other communities, led
by researchers from the RAID Symposia, have researched automated methods for
detecting anomalies and malicious activity. The theme for this year's
workshop will be on bridging the gap between visualization and automation,
such as leveraging the power of visualization to create rules for intrusion
detection and defense systems. We also solicit papers that report results on
visualization techniques and systems in solving all aspects of cyber
security problems, including:

    * Visualization of Internet routing
    * Visualization of packet traces and network flows
    * Visualization of intrusion detection alerts
    * Visualization of attack tracks
    * Visualization of security vulnerabilities
    * Visualization of attack paths
    * Visualization of application processes
    * Visualization for forensic analysis
    * Visualization for correlating events
    * Visualization for computer network defense training
    * Visualization for offensive information operations
    * Visualization for building rules
    * Visualization for feature selection
    * Visualization for cryptology
    * Visualization for detecting anomalous activity
    * Deployment and field testing of VizSec systems
    * Evaluation and user testing of VizSec systems
    * User and design requirements for VizSec systems
    * Lessons learned from development and deployment of VizSec systems

All submitted papers will be peer-reviewed. Full and short papers will be
published by Springer. Poster and demonstration abstracts will be made
available on the web site.

For more information, please see