| |||||||||||||||
TDSC-LGS 2010 : IEEE TDSC Special Issue on Learning, Games and Security | |||||||||||||||
Link: http://www.computer.org/portal/c/document_library/get_file?uuid=b7e6bce8-8041-47f3-bac0-d8960d053c2e&groupId=808447 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
IEEE Transactions on Dependable and Secure Computing
==================================================== Special Issue on "Learning, Games and Security" =============================================== Information and network security are important application areas for machine learning and game theory. For example, the ubiquitousness of wireless lightweight communication devices makes security an important concern. Principled approaches to tackling the problem are necessary. These are frequently interdisciplinary, using elements from machine learning or game theory. In fact, security applications are a point where machine learning and game theory naturally meet. This is especially true in contexts where some learning from data occurs, where the source of the data may be adversarial, or where decision making involves interactions between multiple agents. Machine learning and game theory are also linked at a deeper level. For example, fundamental game theoretic results can be derived from a learning theory perspective. In addition, game theory naturally arises in learning and decision making problems involving multiple agents. This issue is concerned with machine learning and game theoretic topics related to security applications, such as networking, or other multidisciplinary work in cryptography, game theory, machine learning, security and statistics. We invite submissions addressing theoretical problems, as well as practical issues. This includes both principled approaches to solving security problems that employ learning or game theory, as well as contributions on the theory of learning and games, which have a direct connection to security problems. Topics include (but are not limited to): ---------------------------------------- · Adversarial classification, learning and hypothesis testing. · Biometric authentication. · Captchas and other authentication topics. · Cryptographic applications of machine learning. · Distributed inference and decision making (with some relevance to security). · Fraud detection. · Intrusion detection and response. · Learning in unknown and/or partially observable stochastic games. · Malware detection. · Multi-agent systems and mechanism design (with some relevance to security). · Privacy-preserving machine learning. · Spam detection. Important Dates --------------- · Manuscript submission deadline: 30th of November, 2010 · Reviews due: 27th of January, 2011 · Revised papers due: 1st of March, 2011 · Final decision: 1st of April 2011 · Publication materials due: 15st of April, 2011 · Tentative Publication date: Summer/Fall issue, 2011 Submission Procedure -------------------- Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. TDSC requires meaningful technical novelty in submissions that extend previously published conference papers. Extension beyond the conference version(s) is not simply a matter of length. Thus, expanded motivation, expanded discussion of related work, variants of previously reported algorithms, incremental additional experiments/simulations, may provide additional length but will fall below the line for proceeding with review. Submissions can be made at: http://www.computer.org/portal/web/tdsc/author Guest Editors ------------- Dr. Christos Dimitrakakis, Frankfurt Institute for Advanced Studies, Goethe University, Germany Dr. Tom Karygiannis, National Institute of Standards and Technology (NIST), USA Dr. Katerina Mitrokotsa Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland |
|