| |||||||||||||||
GameSec 2010 : Conference on Decision and Game Theory for SecurityConference Series : Decision and Game Theory for Security | |||||||||||||||
Link: http://gamesec-conf.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Securing complex and networked systems and managing associated risks become increasingly important as they play an indispensible role in modern life at the turn of the information age. Concurrently, security of ubiquitous communication, data, and computing pose novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network interdependencies as well as human and social factors. It involves decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. For example, the resources vary from bandwidth, computing, and energy at the machine level to manpower and scheduling at the organizational level.
GameSec conference aims to bring together researchers who aim to establish a theoretical foundation for making resource allocation decisions that balance available capabilities and perceived security risks in a principled manner. The conference focuses analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come. Conference Topics Topics of interest include (but are not limited to): * Security games * Security and risk management * Mechanism design and incentives in security * Decentralized security algorithms * Security of networked systems * Security of Web-based services and social networks * Intrusion and anomaly detection * Resource allocation for security * Optimized response to malware * Identity management * Privacy and security * Reputation and trust * Information security and watermarking * Physical layer security in wireless networks * Information theoretic aspects of security * Adversarial machine learning * Distributed learning for security * Cross-layer security * Usability and security * Human behavior and security * Dynamic control of security systems * Organizational aspects of risk management * Cooperation and competition in security * and more... |
|