VizSec 2013: 10th International Symposium on Visualization for Cyber
Security, Atlanta GA, USA, October 14, 2013. (Submissions due July 22,

The 10th International Symposium on Visualization for Cyber Security
(VizSec) is a forum that brings together researchers and practitioners
from academia, government, and industry to address the needs of the
cyber security community through new and insightful visualization and
analysis techniques. VizSec will provide an excellent venue for
fostering greater exchange and new collaborations on a broad range of
security- and privacy-related topics. Accepted papers will appear in
the ACM Digital Library as part of the ACM International Conference
Proceedings Series.

Important research problems often lie at the intersection of disparate
domains. Our focus is to explore effective, scalable visual interfaces
for security domains, where visualization may provide a distinct
benefit, including computer forensics, reverse engineering, insider
threat detection, cryptography, privacy, preventing 'user assisted'
attacks, compliance management, wireless security, secure coding, and
penetration testing in addition to traditional network security. Human
time and attention are precious resources. We are particularly
interested in visualization and interaction techniques that
effectively capture human analyst insights so that further processing
may be handled by machines, freeing the analyst for other tasks. For
example, a malware analyst might use a visualization system to analyze
a new piece of malicious software and then facilitate generating a
signature for future machine processing. When appropriate, research
that incorporates multiple data sources, such as network packet
captures, firewall rule sets and logs, DNS logs, web server logs,
and/or intrusion detection system logs, is particularly desirable.

Full papers offering novel contributions in security visualization are
solicited. Papers may present techniques, applications, practical
experience, theory, analysis, or experiments and evaluations. We
encourage papers on technologies and methods that promise to improve
cyber security practices, including, but not limited to:

- Situational awareness / understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigation
- Reverse engineering and malware analysis
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation / User testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security
  visualizations (whether from a security goal perspective or a human
  factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security

See for more information.