GameSec: Decision and Game Theory for Security



Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
GameSec 2017 GameSec 2017 : Conference on Decision and Game Theory for Security
Oct 23, 2017 - Oct 25, 2017 Vienna, Austria Jun 29, 2017 (Jun 15, 2017)
GameSec 2016 Conference on Decision and Game Theory for Security
Nov 2, 2016 - Nov 4, 2016 New York, NY, USA Jun 10, 2016 (Jun 3, 2016)
GameSec 2015 6th Conference on Decision and Game Theory for Security
Nov 4, 2015 - Nov 5, 2015 London, UK Jun 8, 2015 (Jun 1, 2015)
GameSec 2014 Conference on Decision and Game Theory for Security
Nov 6, 2014 - Nov 7, 2014 Los Angeles, CA, USA Jun 2, 2014
GameSec 2013 The fourth Conference on Decision and Game Theory for Security
Nov 11, 2013 - Nov 12, 2013 Fort Worth, TX, USA TBD
GameSec 2012 Conference on Decision and Game Theory for Security
Nov 5, 2012 - Nov 6, 2012 Budapest, Hungary Jun 22, 2012
GameSec 2010 Conference on Decision and Game Theory for Security
Nov 22, 2010 - Nov 23, 2010 Berlin, Germany May 15, 2010

Present CFP : 2017

Nations, corporations, and individuals constantly need to reason about how to protect their sensitive assets in order to ensure economic growth and prosperity. Decision making for security and privacy of infrastructure and information needs a scientific framework that can handle challenges arising from modern-day heterogeneous, dynamic, and large-scale systems.

GameSec solicits theoretical and practical contributions towards a science of decision making in security. In particular, GameSec publishes papers that apply decision and game theory, as well as related techniques such as dynamic control and mechanism design, to build resilient, secure, and dependable networked systems.

Conference Topics

The goal of GameSec is to bring together academic and indus- trial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems in a variety of technological systems. Submissions should solely be original research papers that have neither been published nor submitted for publication elsewhere.

-Game theory and mechanism design for security and privacy
-Pricing and economic incentives for building dependable and secure systems
-Dynamic control, learning, and optimization and approximation techniques
-Decision making and decision theory for cybersecurity and security requirements engineering
-Socio-technological and behavioral approaches to security
-Risk assessment and risk management
-Security investment and cyber insurance
-Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems
-New approaches for security and privacy in cloud computing and for critical infrastructure
-Security and privacy of wireless and mobile communications, including user location privacy
-Game theory for intrusion detection
-Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

Special Track on "Data-Centric Models and Approaches"

In cyber and physical security and privacy applications, data plays an important role and presents fundamental challenges. In some domains, it is difficult to gather a large amount of data, and the data available may suffer from severe class imbalance, high noise, and numerous missing entries. In other domains, when multiple agents are involved, how the data presented to the agents impacts their decision making is under-explored. It can be challenging to incorporate data of the available form into the game-theoretic and decision-theoretic models for these domains, since many current approaches apply to precisely defined models and how to define models using the available data is unclear in many cases. In addition to the data-related challenges in cyber and physical security domains, the use of data in many domains leads to security and privacy concerns, and game-theoretic and decision-theoretic models can be designed for addressing such concerns. This special track invites submissions on various data-centric models and approaches, including work on empirical game theory; adversarial machine learning; data collection through crowdsourcing; synthetic data generation; applications of machine learning methods; novel techniques for handling real-world data and evaluating models using data.

Related Resources

ORAJ 2021   Operations Research and Applications: An International Journal
IJCIS 2021   International Journal on Cryptography and Information Security
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
ICONIP 2021   The 28th International Conference on Neural Information Processing (ICONIP2021)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
JAAMAS MODeM SI 2021   Special Issue of JAAMAS on Multi-Objective Decision Making (MODeM)
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
KES 2021   KES2021: Decision support systems, forecasting, classification - invited session IS14
IDT 2021   13th International Conference on Intelligent Decision Technologies
CST 2021   8th International Conference on Foundations of Computer Science & Technology