posted by user: stefanrass || 7843 views || tracked by 6 users: [display]

GameSec 2016 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 2, 2016 - Nov 4, 2016
Where New York, NY, USA
Abstract Registration Due Jun 3, 2016
Submission Deadline Jun 10, 2016
Notification Due Jul 29, 2016
Final Version Due Aug 22, 2016
Categories    security   decision theory   game theory   cryptography
 

Call For Papers

Recent advances in information and communication technologies pose significant security challenges that impact all aspects of modern society. The 7 th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec invites novel, high-quality theoretical and practical-relevant contributions, which apply decision and game theory, as well as related techniques such as distributed optimization, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems.

MAIN TOPICS
• Game theory and mechanism design for security and privacy
• Decision making and decision theory for cybersecurity and security requirements engineering
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• Pricing and economic incentives for building dependable and secure systems
• Risk assessment and security risk management
• Security investment and cyber insurance
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Dynamic control, learning, and optimization and approximation
• Socio-technological and behavioral approaches to security
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

SPECIAL TRACK ON “VALIDATING MODELS"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models". Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.

Related Resources

Research Handbook on Decision Science 2026   Call for Book Chapters: Research Handbook on Decision Science
CRIS 2026   12th International Conference on Cryptography and Information Security
SeRIM 2026   2nd International Workshop on Security and Risk in Identity Management
CRBL 2026   6th International Conference on Cryptography and Blockchain
Petri Nets 2026   Application and Theory of Petri Nets and Concurrency
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
AI-SS 2026   1st International Workshop on AI Safety and Security
ELELIJ 2026   Electrical and Electronics Engineering: An International Journal
CYBERSEC 2026   The First International Conference on Security and Cybersecurity in the AI and Digital Context
IJFCST 2026   International Journal on Foundations of Computer Science & Technology