posted by user: chadnibal || 8144 views || tracked by 9 users: [display]

GameSec 2014 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 6, 2014 - Nov 7, 2014
Where Los Angeles, CA, USA
Submission Deadline Jun 2, 2014
Notification Due Aug 11, 2014
Final Version Due Aug 31, 2014
Categories    security
 

Call For Papers

2014 Conference on Decision and Game Theory for Sec
urity (GameSec),
November 6-7 2014, Los Angeles, CA, USA
Recent advances in networking, communications, comp
utation, software, and hardware
technologies have revolutionized the information te
chnology landscape. Indeed, this
cyberspace has become an integral part of every per
son’s daily life and the way we
conduct business. Protecting the sensitive content
of every nation’s cyberspace
infrastructure has thus become critical to ensure e
conomic growth, prosperity, and
advancement. However, the heterogeneous, dynamic, a
nd large-scale nature of modern-
day networked and information technology infrastruc
ture warrants novel analytical and
practical approaches for securing its assets and ma
intaining its trustworthiness.
Owing to its powerful analytical and modeling frame
works, game theory has recently
emerged as a key tool for building resilient, secur
e, and dependable networked systems.
Coupled with synergistic techniques such as dynamic
control, mechanism design, and
economics, game theory is expected to constitute th
e heart of a much needed science of
security. The goal of the GameSec conference to gat
her original contributions that
present theoretical and practical contributions tha
t will build the knowledgebase in the
science of security, in general, and game-theoretic
security, in particular.

Main Topics
The goal of this conference is to bring together ac
ademic and industrial researchers in an
effort to identify and discuss the major technical
challenges and recent results that
highlight the connection between game theory, contr
ol, distributed optimization,
economic incentives and real world security, reputa
tion, trust and privacy problems in a
variety of technological systems. Topics of interes
t include but are not limited to the
following:

Game-theory and mechanism design for security.

Pricing and economic incentives for building depend
able and secure systems.

Dynamic control, learning, and optimization approac
hes.

Game theory for privacy in the context of applicati
ons and user data.

Decision making and decision theory for cybersecur
ity.

Security of wireless and communication networks.

Novel algorithms, protocols, and approximation tech
niques.

Socio-technological and behavioral approaches to se
curity.

Risk assessment and risk management.

Emerging paradigms such as cyberphysical security
and moving target defence.

New approaches for resilient control systems.

Applications areas: smart grid, wireless networks,
computer networks, and cloud.

Empirical and experimental economic analyses and s
imulation studies
Conference information and submission instructions:
http://www.gamesec-conf.org/

Important Dates
Paper Submission
: June 2, 2014
Decision Notification
: August 11, 2014
Camera-ready manuscript due.
: August 31, 2014

Related Resources

IJGTT 2024   International Journal of Game Theory and Technology
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CGDEIJ 2024   Computer Game Development and Education: An International Journal
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IJCSITY 2024   International Journal of Computational Science and Information Technology
CLNLP 2025   2025 2nd International Conference on Computational Linguistics and Natural Language Processing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2