Magnifying glassVizSec 2022

Welcome to 19th IEEE Symposium on Visualization for Cyber Security

VizSec 2022 will be held in conjunction with the hybrid IEEE VIS Conference on October 19, 2022 in Oklahoma City, USA and online. VizSec brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.

To register for VizSec, see the IEEE VIS registration page.

Questions? Please email for questions regarding VizSec 2022.


All times are Central Time (USA CDT, UTC-5)

09:00 - 10:15
Session 1: Opening and Keynote
moderated by Chris Bryan

09:00 - 09:15
Opening Presentation by Chris Bryan
09:15 - 10:15
Beyond Vis(Sec): Emerging Trends in Data Science for Cybersecurity
by Jordan Crouser, Smith College.
Please see below for bio.
10:15 - 10:45

10:45 - 12:00
Session 2: Best Paper Award and Paper Presentations
moderated by Steven Gomez

10:45 - 10:50
Session Intro and Best Paper Award by Steven Gomez
10:50- 11:05
Analysis of the Design Space for Cybersecurity Visualizations in VizSec
by Adrian Komadina, Željka Mihajlović, Stjepan Groš
11:05- 11:20
Visualization Of Class Activation Maps To Explain AI Classification Of Network Packet Captures
by Igor Cherepanov, Alex Ulmer, Jonathan Geraldi Joewono, Jörn Kohlhammer
11:20- 11:30
Portola: A Hybrid Tree and Network Visualization Technique for Network Segmentation
by Kuhu Gupta, Aditeya Pandey, Larry Chan, Ambika Yadav, Brian Staats, Michelle A. Borkin
11:30- 11:45
PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data
by Kaustav Bhattacharjee, Akm Zahirul Islam, Jaideep Vaidya, Aritra Dasgupta
11:45- 12:00
Visual Firewall Log Analysis - At the Border Between Analytical and Appealing
by Marija Schufrin, Hendrik Lücke-Tieke, Jörn Kohlhammer Best Paper Award
12:00 - 14:00
Lunch Break

14:00 - 15:15
Session 3: Discussion Panel and Closing
moderated by Steven Gomez

14:00 - 15:00
Virtual Panel: “Translating Real Needs for Cyber Operators into Impactful R&D"
with Sanchari Das, Kami Vaniea, Prashanth Rajivan, Josiah Dykstra, Glenn Fink and Vince Mancuso
15:00 - 15:05
Best Poster Award
by Steven Gomez
A Proposal for Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning
by Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo
Abstract Poster
Riverside: Dynamic Visualization of Network Traffic for Situation Awareness in Computer Security
by Kaitlyn DeValk, Niklas Elmqvist
Abstract Poster
Explainability for Safety in Reinforcement Learning
by Tongtong Liu, Md Asifur Rahman, Joe McCalmon, Sarra Alqahtani
Abstract Poster
Critical Path Exploration Dashboard for Alert-driven Attack Graphs
by Azqa Nadeem, Sònia Leal Díaz, Sicco Verwer Best Poster Award
Abstract Poster
15:05 - 15:15
by Chris Bryan


Beyond Vis(Sec): Emerging Trends in Data Science for Cybersecurity

Jordan Crouser
Smith College

R. Jordan Crouser

R. Jordan Crouser is a visual analytics researcher, semi-professional data wrangler, and Associate Professor of Computer Science at Smith College. He enjoys teaching introductory programming, theory of computation, data visualization, and machine learning. His research program investigates the complementary nature of human and machine computation as used in visual analytics and other human-machine collaborative systems. These systems make use of the human visual system, as well as our capacity to understand and reason about complex data. He chairs the VAST Challenge, and has published his technical contributions in the areas of visualization theory, human-computer interaction, educational technology, visual analytics systems and human computation. Prior to returning to academia, Crouser spent two years doing research and building analytical tools at MIT Lincoln Laboratory.

VizSec 2022 Call for Papers

We are cordially inviting you to participate in the 19th IEEE Symposium on Visualization for Cyber Security (VizSec) 2022. VizSec brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics.

VizSec will take place on Wednesday, October 19, 2022, in conjunction with the 2022 IEEE VIS conference, giving VizSec authors and attendees enhanced access to IEEE VIS. The VizSec program will be presented in a hybrid format with virtual presentations.

The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user-assisted attacks prevention, compliance management, wireless security, secure coding, penetration testing, and other related research topics.

We are soliciting Technical (Full), Short, and Position Papers.

Technical Papers

Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:

  • Situation awareness and/or understanding
  • Incident handling including triage, exploration, correlation, and response
  • Computer forensics
  • Machine learning & explainable AI for cybersecurity
  • Adversarial machine learning visualization
  • Adversarial visualization
  • Visual analytics for cybersecurity
  • Data protection & privacy
  • Blockchain performance & security
  • Cybersecurity in critical infrastructure
  • Collaborative visualization for cybersecurity & provenance
  • Decision support for security configuration and deployment
  • Reverse engineering and malware analysis
  • Vulnerability management
  • Multiple data source analysis
  • Analyzing information requirements for computer network defense
  • Evaluation and/or user testing of systems
  • Criteria for assessing the effectiveness of cyber security visualizations, for security goals or human factors
  • System modeling and network analysis
  • Usable Security and Privacy
  • Software security
  • Mobile application security
  • Social networking privacy and security
  • Training & education
  • Visualization for privacy engineering

Submissions including tests and evaluations of the proposed tools and techniques are also considered particularly desirable. If possible, making test data available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VizSec dataset links. Please see past years proceedings and websites to see the quality and examples of previous submissions. Previous VizSec papers may also be found on the VizSec Papers Browser and on IEEE Xplore.

Short Papers

Short papers describing initial research results, concise research contributions, or incremental work on the above topics, even including practical applications of security visualization, are solicited. We encourage the submission of papers discussing the introduction of cyber security visualizations into operational context, including, but not limited to:

  • Cases where visualization made positive contributions towards meeting operational needs
  • Gaps or negative outcomes from visualization deployments
  • Situations where visualization was not utilized, but could have had a positive impact
  • Lessons learned from operational engagements
  • Insights gained from the transition process

Cyber security practitioners from industry, as well as the research community, are encouraged to submit case studies.

Position Papers

Position papers focus on topics needing or calling for discussion or reconsideration of forgotten topics relevant for the VizSec community. They should report a clear position on the target topic and should also suggest a proposal or actions regarding the target topic. They should stimulate imaginative and hypothesis-driven research. In particular, we encourage submissions both from researchers inside the visualization community and outside, such as researchers and practitioners from pure cybersecurity domains who currently do not broadly employ visualization in their work.


Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. The poster session offers a timely venue to present and discuss these submissions through active engagement with the community. In line with the full VIS 2022 conference, the presentation of posters is likely to take place in a physical event. There will be 1-2 dedicated poster sessions in which poster authors can meet and discuss their work with conference participants. An additional web presence of posters will supplement the traditional physical installation of poster boards. More concrete details will follow soon, with the goal of creating an engaging atmosphere consistent with past in-person poster sessions.


There will be an award for the best full paper from the accepted program. This award will be given to the paper judged to have the highest overall quality as determined by the program committee. Key elements of the selection process include whether papers include evaluation, repeatable results, and open-source data or software. Authors of the best paper will be invited to submit an article about their work to the IEEE Transactions on Visualization and Computer Graphics journal.

There will also be an award for Best Poster. This award will recognize authors’ efforts to clearly present their work to the audience. The award will be determined by anonymous judges and given to recipients at the end of the conference


The VizSec 2022 Proceedings will be published by IEEE. Submissions must be formatted using the IEEE VGTC conference proceedings template that can be found at:

VizSec full papers are limited to 9 pages of content plus an additional 2 pages of references. Papers may be shorter than this but must make a similar contribution to a longer paper. Reviewers are not required to read the appendices or any pages past the maximum. Short papers must be at most 4 pages plus 1 page of references. Position papers must be at most 4 pages total including references. Posters must be 2-page abstracts. Presenters are also encouraged to submit an accompanying video or other supplementary materials by following the IEEE VIS formatting guidelines.

Submissions not meeting these guidelines will be rejected without consideration of their merit. Reviews are single-blind, so authors may include names and affiliations in their submissions. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Paper submissions:
Go to, then make a new submission to Society: VGTC, Conference/Journal: VIS 2022, Track: VIS 2022 VizSec

Poster submissions:
Go to, then make a new submission to Society: VGTC, Conference/Journal: VIS 2022 >> Track: VIS 2022 VizSec Posters. Authors of accepted posters will be asked to submit an electronic poster following the IEEE VIS instructions for the posters.

Important Dates

All deadlines are 5:00 PM PST.

Paper deadlines: Extended!

June 22, 2022 July 01, 2022 Expired! Submission deadline for full, short, and position papers

July 18, 2022 July 20, 2022 Author notifications

Aug 08, 2022 Camera ready submissions and copyright forms due

Poster deadlines:

July 28, 2022 Aug 02, 2022 Expired! Submission deadline for posters

Aug 08, 2022 Aug 14, 2022 Poster Author notifications

Sep 01, 2022 Video Preview (optional)

Sep 01, 2022 Sep 05, 2022 Camera-ready abstract and poster PDF

VizSec will be held on October 19, 2022.


Organizing Committee

Program Committee

  • Andrick Adhikari University of Denver
  • Kenneth Alperin MIT Lincoln Laboratory
  • Marco Angelini University of Rome "La Sapienza"
  • Daniel Best Pacific Northwest National Laboratory
  • Fabian Böhm Universität Regensburg
  • Chris Bryan Arizona State University
  • Siming Chen Fudan University
  • Ann Cox DHS Science & Technology Directorate, Cyber Security Division
  • Robertas Damaševičiu Kaunas University of Technology
  • Sanchari Das University of Denver
  • Aritra Dasgupta New Jersey Institute of Technology
  • Sophie Engle University of San Francisco
  • Lyndsey Franklin Pacific Northwest National Laboratory
  • John Gerth Stanford University
  • Mohammad Ghoniem Luxembourg Institute of Science and Technology
  • Steven Gomez MIT Lincoln Laboratory
  • Robert Gove CrowdStrike
  • Christopher Humphries INRIA
  • Jörn Kohlhammer Fraunhofer IGD
  • Frédéric Majorczyk DGA-MI
  • Nicolas Prigent LSTI
  • Noëlle Rakotondravony Worcester Polytechnic Institute
  • Rosa Romero-Gómez Uncharted Software
  • Giuseppe Santucci University of Rome "La Sapienza"
  • Graig Sauer U.S. Department of Defense
  • Christopher Simpson National University
  • Sébastien Tricaud Devo
  • David Trimm U.S. Department of Defense
  • Alex Ulmer Fraunhoer IGD
  • Xumeng Wang Nankai University

Steering Committee