VizSEC 2007 
Workshop on Visualization for Computer Security
October 29, 2007
Sacramento, CA USA
In conjunction with IEEE Vis 2007 and IEEE InfoVis 2007
Sponsored by NSA's National Information Assurance Research Laboratory (NIARL)

Call for Participation:

The VizSEC 2007 Workshop on Visualization for Computer Security will
provide a forum for new research in visualization for computer
security. Building on the success of the previous three VizSEC
workshops, we will again be meeting in conjunction with the IEEE Vis
and InfoVis Conferences. The workshop will be held in Sacramento, CA
USA on October 29, 2007.

Networked computers are increasingly ubiquitous, and they are subject
to attack, misuse, and abuse. Every effort is being made by
organizations and individuals to build and maintain trustworthy
computing systems. Traditional, signature-based and statistical
methods are limited in their capability to cope with the large,
evolving data and the dynamic nature of Internet. In many
applications, visualization proves very effective to understand large
high-dimensional data. Thus, there is a growing interest in the
development of visualization methods as alternative or complementary
solutions to the pressing cyber security problems.

As a result of previous VizSEC workshops, we have seen both the
application of existing visualization techniques to security problems
and the development of novel security visualization
approaches. However, while security visualization research has
addressed the development of applications there has only been limited
coverage of user needs and designing visualization to support those
needs. To address this shortcoming, the theme of this year's workshop
will be on applying user-centered design to VizSEC research, focusing
on integrating users' needs, visualization design, and
evaluation. This year's workshop will be an incubator for new ideas
related to security visualization, a forum for garnering feedback from
peers, and a place to identify and meet potential collaborators.

Paper Submission:
We solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems. Topics include, but are not limited to:
	o	Visualization of Internet routing for security
	o	Visualization of packet traces and network flows for security
	o	Visualization of security vulnerabilities and attack paths
	o	Visualization of intrusion detection alerts
	o	Visualization of application processes for security
	o	Visualization for forensic analysis
	o	Visualization for correlating events
	o	Visualization for computer network defense training
	o	Visualization for offensive information operations
	o	Visualization for feature selection
	o	Visualization for detecting anomalous activity
	o	Deployment and field testing of VizSEC systems
	o	Evaluation and user testing of VizSEC systems
	o	User and design requirements for VizSEC systems
	o	Lessons learned from VizSEC systems development and deployment

Papers should be no more than 10 pages, including bibliography and
high resolution, color images. All submissions must be in PDF format
and should not be blinded. All submitted papers will be
peer-reviewed. Accepted papers will be published in an edited book by
Springer after the workshop.

Important Dates:
September 14, 2007:  Full paper due (up to 10 pages)
October 5, 2007:  Paper acceptances announced
October 29, 2007:  Workshop

Workshop Chair:
John Goodall, Secure Decisions division of Applied Visions, Inc.

Program Co-Chairs:
Kwan-Liu Ma, University of California at Davis
Gregory Conti, United States Military Academy

Program Committee:
Kulsoom Abdullah, Georgia Institute of Technology
Jim Agutter, University of Utah
Stefan Axelsson, Blekinge Institute of Technology
Anita D'Amico, Secure Decisions
Deborah Frincke, Pacific Northwest National Laboratory
John Gerth, Stanford University
Patrick Hertzog, NEXThink S.A.
Kiran Lakkaraju, University of Illinois at Urbana-Champaign
Yarden Livnat, University of Utah
Raffael Marty, Splunk
Daniel Keim, University of Konstanz
Stephen North, AT&T Research
Penny Rheingans, UMBC
Walt Tirenin, Air Force Research Laboratory
Soon Tee Teoh, San Jose State University
Kirsten Whitley, Department of Defense