posted by organizer: khouzani || 9575 views || tracked by 10 users: [display]

GameSec 2015 : 6th Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 4, 2015 - Nov 5, 2015
Where London, UK
Abstract Registration Due Jun 1, 2015
Submission Deadline Jun 8, 2015
Notification Due Jul 29, 2015
Final Version Due Aug 25, 2015
Categories    security   privacy   game theory   decision theory
 

Call For Papers

Nations, corporations, and individuals constantly need to reason about how to protect their sensitive assets in order to ensure economic growth and prosperity. Decision making for security and privacy of infrastructure and information needs a scientific
framework that can handle challenges arising from modern-day heterogeneous, dynamic, and large-scale systems.

GameSec solicits theoretical and practical contributions towards a science of decision making in security. In particular, GameSec publishes papers that apply decision and game theory, as well as related techniques such as dynamic control and mechanism design, to build resilient, secure, and dependable networked systems.
The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems in a variety of technological systems.

Submissions should solely be original research papers that have neither been published nor submitted for publication elsewhere.

Main Topics
• Game theory and mechanism design for security and privacy
• Pricing and economic incentives for building dependable and secure systems
• Dynamic control, learning, and optimization and approximation techniques
• Decision making and decision theory for cybersecurity and security requirements engineering
• Socio-technological and behavioral approaches to security
• Risk assessment and risk management
• Security investment and cyber insurance
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Game theory for intrusion detection
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

Related Resources

DEMA 2026   DEMONSTRATIO MATHEMATICA
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
Research Handbook on Decision Science 2026   Call for Book Chapters: Research Handbook on Decision Science
CRBL 2026   6th International Conference on Cryptography and Blockchain
CTADS 2026   2026 2nd International Conference on Communication Technology and Data Security-EI/Scopus
EI/Scopus-ICMLM 2026   2026 International Conference on Machine Learning and Large Models-EI/Scopus
icWCSN 2026   2026 13th International Conference on Wireless Communication and Sensor Networks (icWCSN 2026)
IJWesT 2026   International Journal of Web & Semantic Technology
IEEE-AIDM 2026   2026 International Conference on Artificial Intelligence and Data Mining
CSAIDE 2026   2026 5th International Conference on Cyber Security, Artificial Intelligence and Digital Economy