<div dir="ltr"><span id="gmail-docs-internal-guid-0e53a8a6-7fff-c33f-3cf1-b731abdd61f6"><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Website: </span><a href="https://vizsec.org/vizsec2021/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://vizsec.org/vizsec2021/</span></a><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Submission Deadline: </span><span style="font-size:12pt;font-family:"Times New Roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">June 21, 2021</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Event Date: </span><span style="font-size:12pt;font-family:"Times New Roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">October 27, 2021</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">We are cordially inviting you to participate in the 18th IEEE Symposium on Visualization for Cyber Security (VizSec) 2021.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec will take place on October 27, 2021, in conjunction with the </span><a href="http://ieeevis.org/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(220,53,33);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">2021 IEEE VIS conference</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, giving VizSec authors and attendees enhanced access to IEEE VIS. VizSec program will be presented in an online format with virtual presentations.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user-assisted attacks prevention, compliance management, wireless security, secure coding, penetration testing, and other related research topics.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">We are soliciting Technical (Full), Short, and Position Papers. </span><span style="font-size:12pt;font-family:"Times New Roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Technical Papers</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Situation awareness and/or understanding</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Incident handling including triage, exploration, correlation, and response</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Computer forensics</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Machine learning & explainable AI for cybersecurity</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Adversarial machine learning visualization</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Adversarial visualization</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Visual analytics for cybersecurity</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Data protection & privacy</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Blockchain performance & security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cybersecurity in critical infrastructure</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Collaborative visualization for cybersecurity & provenance</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Recording and reporting results of investigations</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Assisting proactive security configuration and deployment</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Reverse engineering and malware analysis</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Vulnerability management</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Multiple data source analysis</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Analyzing information requirements for computer network defense</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Evaluation and/or user testing of VizSec systems</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Modeling system and network behavior</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Modeling attacker and defender behavior</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Studying risk and impact of cyber attacks</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Predicting future attacks or targets</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Security metrics</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Software security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Mobile application security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Social networking privacy and security</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Training & education</span></p></li></ul><br><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Submissions including tests and evaluations of the proposed tools and techniques are also particularly desirable. If possible, making the data used for the tests available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the </span><a href="https://vizsec.org/data/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(220,53,33);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec dataset links</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. Previous VizSec papers may be found on the </span><a href="https://vizsec.dbvis.de/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(220,53,33);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec Papers Browser</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> and on IEEE Xplore.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Short Papers</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Short papers describing initial research results, concise research contributions or incremental work on the above topics, even including practical applications of security visualization, are solicited. We encourage the submission of papers discussing the introduction of cyber security visualizations into operational context, including, but not limited to:</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cases where visualization made positive contributions towards meeting operational needs</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Gaps or negative outcomes from visualization deployments</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Situations where visualization was not utilized, but could have had a positive impact</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Lessons learned from operational engagements</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.295;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Insights gained from the transition process</span></p></li></ul><br><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cyber security practitioners from industry, as well as the research community, are encouraged to submit case studies.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Position Papers</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Position papers focus on topics needing or calling for discussion or reconsideration of forgotten topics relevant for the VizSec community. They should report a clear position on the target topic and should also suggest a proposal or actions regarding the target topic. They should stimulate imaginative and hypothesis-driven research. In particular, we encourage submissions both from researchers inside the visualization community and outside, such as researchers and practitioners from pure cybersecurity domains who currently do not broadly employ visualization in their work.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Posters</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. In line with the full conference, the presentation of posters will take place online. There will be 1-2 dedicated poster sessions in which poster authors can virtually meet and discuss their work with conference participants. An additional web presence of posters will replace the traditional physical installation of poster boards. More concrete details will follow soon.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Awards</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">There will be an award for the best full paper from the accepted program. This award will be given to the paper judged to have the highest overall quality as determined by the program committee. Key elements of the selection process include whether papers include evaluation, repeatable results, and open-source data or software. Authors of the best paper will be invited for submission to Transactions on Visualization and Computer Graphics.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">There will also be an award for Best Poster. This award will recognize authors’ efforts to clearly present their work to the audience. The award will be determined by anonymous judges and given to recipients at the end of the conference.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Submissions</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The VizSec 2021 Proceedings will be published by IEEE. Submissions must be formatted using the IEEE VGTC conference proceedings template that can be found at: </span><a href="https://tc.computer.org/vgtc/publications/conference/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(220,53,33);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">https://tc.computer.org/vgtc/publications/conference/</span></a></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec full papers are limited to 9 pages of content plus an additional 2 pages of references. Papers may be shorter than this but must make a similar contribution to a longer paper. Reviewers are not required to read the appendices or any pages past the maximum. Short papers should be at most 4 pages plus 1 page of references. Position papers may be up to 4 total pages including references. Posters should be 2 page abstracts. Presenters are also encouraged to submit an accompanying video or other supplementary materials by following the IEEE VIS formatting guidelines.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Submissions not meeting these guidelines will be rejected without consideration of their merit. Reviews are single-blind, so authors may include names and affiliations in their submissions. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec uses the </span><a href="https://new.precisionconference.com/vgtc" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(220,53,33);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Precision Conference System (PCS)</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> to handle their paper and poster submissions and reviewing processes.</span></p><p dir="ltr" style="line-height:1.32;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:7pt 0pt 15pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Important Dates</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">All deadlines are 5:00 PM PST.</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">June 21, 2021</span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Submission deadline for full, short, and position papers</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">July 19, 2021</span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Author notifications</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Aug 9, 2021</span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Camera-ready submissions and copyright forms due</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">July 29, 2021</span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Submission deadline for posters</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Aug 9, 2021</span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Author notifications</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(51,51,51);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">For more information please see: </span><a href="https://vizsec.org/vizsec2021/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://vizsec.org/vizsec2021/</span></a></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 8pt"> </p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Sincerely,</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">VizSec 2021 Publicity Co-Chairs</span></p><p dir="ltr" style="line-height:1.295;text-align:justify;margin-top:0pt;margin-bottom:8pt"><span style="font-size:12pt;font-family:"Times New Roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Sanchari Das, Noëlle Rakotondravony</span></p></span><br class="gmail-Apple-interchange-newline"></div>