| |||||||||||||||||
GameSec 2022 : Conference on Decision and Game Theory for SecurityConference Series : Decision and Game Theory for Security | |||||||||||||||||
Link: https://www.gamesec-conf.org/index.php | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
CALL FOR PAPERS
*** GameSec22: The 13th Conference on Decision and Game Theory for Security *** =========================================================== Pittsburgh, Pennsylvania, October 26-28, 2022 Abstract deadline (optional): 7/6/2022 Submission deadline: 7/13/2022 Submission link: https://easychair.org/my/conference?conf=gamesec22 Submission instructions: https://www.gamesec-conf.org/papers.php Topics: game theory, security, artificial intelligence, behavioral science Modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing the security of the emerging systems, many of them safety critical, poses significant challenges. The 13th Conference on Decision and Game Theory for Security (GameSec-22) will take place on October 26-28, 2022 in Pittsburgh, Pennsylvania, USA. It focuses on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically relevant analytical methods. GameSec 2022 invites novel, high-quality theoretical and practically relevant contributions, which apply decision and game theory to security problems. The goal of the conference is to bring together academic, government, and industrial researchers in an effort to identify and discuss the major challenges and recent results that highlight the connections between game theory, control, distributed optimization, machine learning, economic incentives, real-world security, reputation, trust and privacy problems. GameSec-22 is planned to be a physical event. Requests of remote attendance, e.g., due to visa issues or travel restrictions, may be accommodated if necessary. For more travel details, including the up-to-date Covid regulations, please refer to https://www.gamesec-conf.org/travel.php. Paper Submission Guideline -------------------------------- Each submission should be previously unpublished work that is not currently under submission to another conference. Submissions can be (but do not have to be) anonymized. **Full paper** submissions are not to exceed **20 pages** including references and well-formatted appendices. Full papers should make a strong technical contribution and adequately highlight the novel aspects of the work in relation to related research. ### **Submission instructions** Prospective authors are encouraged to register their paper by uploading title, authors, and a short abstract (a few hundred words, not an extended abstract) by the abstract submission deadline, 23:59 PST time. Then, authors can update the title, authors, abstract and submit a PDF file with the full paper by the full paper submission deadline, 23:59 PST time. Submitting an abstract is not mandatory. Authors can still submit a full paper by the final deadline without having previously submitted an abstract. ### Paper Preparation All submissions must adhere to the Springer's Lecture Notes in Computer Science (LNCS) format (https://www.springer.com/gp/computer-science/lncs). For a detailed description, please consult the Author Guidelines for the Preparation of Contributions to Springer Computer Science Proceedings (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19242230/data/v9). The LaTex2e template which supports hyperlinks for the online versions can be downloaded (in zip format) at ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip. As a sample, the source files of the Author Instructions (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19238648/data/v4) are also made available by Springer. Although discouraged to use, template files for Office 2007 Word (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19238706/data/v1) and Office 2003 Word (https://resource-cms.springernature.com/springer-cms/rest/v1/content/7117506/data/v1) are also provided. The authors are advised to carefully read the explanatory typing instruction documents contained within the corresponding archive file. Please note that the wide empty margins are to be expected. The LNCS series will be published in a smaller than A4 cut, and hence the margins will be rectified by the publisher. Authors should consult Springer's authors' guidelines (ftp://ftp.springernature.com/cs-proceeding/svproc/guidelines/Springer_Guidelines_for_Authors_of_Proceedings.pdf) and use their proceedings templates, either for [LaTeX](ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip) or for [Word](ftp://ftp.springernature.com/cs-proceeding/llncs/word/splnproc1703.zip), for the preparation of their papers. Springer encourages authors to include their [ORCIDs](https://goo.gl/hbsa4D) in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. List of Topics -------------- - Game theory and mechanism design for security and privacy - Decision making and decision theory for cybersecurity and security requirements engineering - Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems - Pricing and economic incentives for building dependable and secure systems - Risk assessment and security risk management - Security investment and cyber insurance - New approaches for security and privacy in cloud computing and for critical infrastructure - Security and privacy of wireless and mobile communications, including user location privacy - Dynamic control, learning, and optimization and approximation - Socio-technological and behavioral approaches to security - Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy - Behavioral science, decision making, heuristics, and biases - Modeling and analysis of deception for security within a game-theoretic framework - Adversarial or strategic machine learning and the role of AI in system security Learning in games for security (new topic this year) - Game-theoretic or decision-theoretic analysis for the control of epidemics/virus propagation (new topic this year) - Decision and game theory for blockchain security (new topic this year) Committees ---------- ### Organizing committee - General Chair: Fei Fang (Carnegie Mellon University) - TPC Chairs: Haifeng Xu (University of Virginia), Yezekael Hayel (University of Avignon) - Publicity Co-chair: Tiffany Bao (Arizona State University) - Web Chair: Chun Kai Ling (Carnegie Mellon University) Publication ----------- GameSec22 proceedings will be published in [Springer Lecture Notes of Computer Science](https://link.springer.com/conference/gamesec) Contact ------- All questions about submissions should be emailed to Haifeng Xu (hx4ad@virginia.edu) or Yezekael Hayel (yezekael.hayel@univ-avignon.fr) |
|