GameSec: Decision and Game Theory for Security



Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
GameSec 2016 Conference on Decision and Game Theory for Security
Nov 2, 2016 - Nov 4, 2016 New York, NY, USA Jun 10, 2016 (Jun 3, 2016)
GameSec 2015 6th Conference on Decision and Game Theory for Security
Nov 4, 2015 - Nov 5, 2015 London, UK Jun 8, 2015 (Jun 1, 2015)
GameSec 2014 Conference on Decision and Game Theory for Security
Nov 6, 2014 - Nov 7, 2014 Los Angeles, CA, USA Jun 2, 2014
GameSec 2013 The fourth Conference on Decision and Game Theory for Security
Nov 11, 2013 - Nov 12, 2013 Fort Worth, TX, USA TBD
GameSec 2012 Conference on Decision and Game Theory for Security
Nov 5, 2012 - Nov 6, 2012 Budapest, Hungary Jun 22, 2012
GameSec 2010 Conference on Decision and Game Theory for Security
Nov 22, 2010 - Nov 23, 2010 Berlin, Germany May 15, 2010

Present CFP : 2016

Recent advances in information and communication technologies pose significant security challenges that impact all aspects of modern society. The 7 th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec invites novel, high-quality theoretical and practical-relevant contributions, which apply decision and game theory, as well as related techniques such as distributed optimization, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems.

• Game theory and mechanism design for security and privacy
• Decision making and decision theory for cybersecurity and security requirements engineering
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• Pricing and economic incentives for building dependable and secure systems
• Risk assessment and security risk management
• Security investment and cyber insurance
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Dynamic control, learning, and optimization and approximation
• Socio-technological and behavioral approaches to security
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models". Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.


Related Resources

IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
GameNets 2017   7th EAI International Conference on Game Theory for Networks
ORAJ 2016   Operations Research and Applications: An International Journal
IJGTT 2016   International Journal of Game Theory and Technology ( IJGTT)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
PAM 2017   Passive and Active Measurement Conference
PODS 2017   36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
CDC 2017   56th IEEE Conference on Decision and Control
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine