posted by user: stefanrass || 7741 views || tracked by 6 users: [display]

GameSec 2016 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 2, 2016 - Nov 4, 2016
Where New York, NY, USA
Abstract Registration Due Jun 3, 2016
Submission Deadline Jun 10, 2016
Notification Due Jul 29, 2016
Final Version Due Aug 22, 2016
Categories    security   decision theory   game theory   cryptography
 

Call For Papers

Recent advances in information and communication technologies pose significant security challenges that impact all aspects of modern society. The 7 th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec invites novel, high-quality theoretical and practical-relevant contributions, which apply decision and game theory, as well as related techniques such as distributed optimization, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems.

MAIN TOPICS
• Game theory and mechanism design for security and privacy
• Decision making and decision theory for cybersecurity and security requirements engineering
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• Pricing and economic incentives for building dependable and secure systems
• Risk assessment and security risk management
• Security investment and cyber insurance
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Dynamic control, learning, and optimization and approximation
• Socio-technological and behavioral approaches to security
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

SPECIAL TRACK ON “VALIDATING MODELS"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models". Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CCCIoT 2026   7th International Conference on Cloud Computing and IoT
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
CoDIT 2026   2026 12th International Conference on Control, Decision and Information Technologies
ITEORY 2025   3rd International Conference on Information Theory and Machine Learning
BIO 2026   8th International Conference on Bioscience & Engineering
Research Handbook on Decision Science 2026   Call for Book Chapters: Research Handbook on Decision Science
DNLP 2026   7th International Conference on Data Mining and NLP