posted by user: stefanrass || 1923 views || tracked by 5 users: [display]

GameSec 2016 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 2, 2016 - Nov 4, 2016
Where New York, NY, USA
Abstract Registration Due Jun 3, 2016
Submission Deadline Jun 10, 2016
Notification Due Jul 29, 2016
Final Version Due Aug 22, 2016
Categories    security   decision theory   game theory   cryptography
 

Call For Papers

Recent advances in information and communication technologies pose significant security challenges that impact all aspects of modern society. The 7 th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec invites novel, high-quality theoretical and practical-relevant contributions, which apply decision and game theory, as well as related techniques such as distributed optimization, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems.

MAIN TOPICS
• Game theory and mechanism design for security and privacy
• Decision making and decision theory for cybersecurity and security requirements engineering
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• Pricing and economic incentives for building dependable and secure systems
• Risk assessment and security risk management
• Security investment and cyber insurance
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Dynamic control, learning, and optimization and approximation
• Socio-technological and behavioral approaches to security
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

SPECIAL TRACK ON “VALIDATING MODELS"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models". Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
GameNets 2017   7th EAI International Conference on Game Theory for Networks
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
IJGTT 2016   International Journal of Game Theory and Technology ( IJGTT)
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
AEIJ 2016   Advanced Energy: An International Journal
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
PODS 2017   36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
CDC 2017   56th IEEE Conference on Decision and Control