posted by user: stefanrass || 4891 views || tracked by 5 users: [display]

GameSec 2016 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: http://www.gamesec-conf.org/
 
When Nov 2, 2016 - Nov 4, 2016
Where New York, NY, USA
Abstract Registration Due Jun 3, 2016
Submission Deadline Jun 10, 2016
Notification Due Jul 29, 2016
Final Version Due Aug 22, 2016
Categories    security   decision theory   game theory   cryptography
 

Call For Papers

Recent advances in information and communication technologies pose significant security challenges that impact all aspects of modern society. The 7 th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec invites novel, high-quality theoretical and practical-relevant contributions, which apply decision and game theory, as well as related techniques such as distributed optimization, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems.

MAIN TOPICS
• Game theory and mechanism design for security and privacy
• Decision making and decision theory for cybersecurity and security requirements engineering
• Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
• Pricing and economic incentives for building dependable and secure systems
• Risk assessment and security risk management
• Security investment and cyber insurance
• New approaches for security and privacy in cloud computing and for critical infrastructure
• Security and privacy of wireless and mobile communications, including user location privacy
• Dynamic control, learning, and optimization and approximation
• Socio-technological and behavioral approaches to security
• Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

SPECIAL TRACK ON “VALIDATING MODELS"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models". Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.

Related Resources

C2SI 2019   3rd International Conference on Codes, Cryptology and Information Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
NMOCT 2018   4th International Conference On Networks, Mobile Communications And Telematics
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
DSN 2019   Dependable Systems and Networks
CDC 2019   58th Conference on Decision and Control
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ACNS 2019   International Conference on Applied Cryptography and Network Security
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems