posted by user: chadnibal || 5253 views || tracked by 9 users: [display]

GameSec 2014 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 6, 2014 - Nov 7, 2014
Where Los Angeles, CA, USA
Submission Deadline Jun 2, 2014
Notification Due Aug 11, 2014
Final Version Due Aug 31, 2014
Categories    security
 

Call For Papers

2014 Conference on Decision and Game Theory for Sec
urity (GameSec),
November 6-7 2014, Los Angeles, CA, USA
Recent advances in networking, communications, comp
utation, software, and hardware
technologies have revolutionized the information te
chnology landscape. Indeed, this
cyberspace has become an integral part of every per
son’s daily life and the way we
conduct business. Protecting the sensitive content
of every nation’s cyberspace
infrastructure has thus become critical to ensure e
conomic growth, prosperity, and
advancement. However, the heterogeneous, dynamic, a
nd large-scale nature of modern-
day networked and information technology infrastruc
ture warrants novel analytical and
practical approaches for securing its assets and ma
intaining its trustworthiness.
Owing to its powerful analytical and modeling frame
works, game theory has recently
emerged as a key tool for building resilient, secur
e, and dependable networked systems.
Coupled with synergistic techniques such as dynamic
control, mechanism design, and
economics, game theory is expected to constitute th
e heart of a much needed science of
security. The goal of the GameSec conference to gat
her original contributions that
present theoretical and practical contributions tha
t will build the knowledgebase in the
science of security, in general, and game-theoretic
security, in particular.

Main Topics
The goal of this conference is to bring together ac
ademic and industrial researchers in an
effort to identify and discuss the major technical
challenges and recent results that
highlight the connection between game theory, contr
ol, distributed optimization,
economic incentives and real world security, reputa
tion, trust and privacy problems in a
variety of technological systems. Topics of interes
t include but are not limited to the
following:

Game-theory and mechanism design for security.

Pricing and economic incentives for building depend
able and secure systems.

Dynamic control, learning, and optimization approac
hes.

Game theory for privacy in the context of applicati
ons and user data.

Decision making and decision theory for cybersecur
ity.

Security of wireless and communication networks.

Novel algorithms, protocols, and approximation tech
niques.

Socio-technological and behavioral approaches to se
curity.

Risk assessment and risk management.

Emerging paradigms such as cyberphysical security
and moving target defence.

New approaches for resilient control systems.

Applications areas: smart grid, wireless networks,
computer networks, and cloud.

Empirical and experimental economic analyses and s
imulation studies
Conference information and submission instructions:
http://www.gamesec-conf.org/

Important Dates
Paper Submission
: June 2, 2014
Decision Notification
: August 11, 2014
Camera-ready manuscript due.
: August 31, 2014

Related Resources

C2SI 2019   3rd International Conference on Codes, Cryptology and Information Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SECITC 2018   11th International Conference on Security for Information Technology and Communications
CDC 2019   58th Conference on Decision and Control
NECO 2018   7th International Conference of Networks and Communications
ACNS 2019   International Conference on Applied Cryptography and Network Security
DSN 2019   Dependable Systems and Networks
VISAPP 2019   14th International Conference on Computer Vision Theory and Applications
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy