Difference between revisions of "GameSec 2021"
Jump to navigation
Jump to search
| Line 24: | Line 24: | ||
GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics: | GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics: | ||
| − | Game theory, control, and mechanism design for security and privacy | + | * Game theory, control, and mechanism design for security and privacy |
| − | Decision making for cybersecurity and security requirements engineering | + | * Decision making for cybersecurity and security requirements engineering |
| − | Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure | + | * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure |
| − | Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems | + | * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems |
| − | Risk assessment and security risk management | + | * Risk assessment and security risk management |
| − | Security and privacy of wireless and mobile communications, including user location privacy | + | * Security and privacy of wireless and mobile communications, including user location privacy |
| − | Socio-technological and behavioral approaches to security | + | * Socio-technological and behavioral approaches to security |
| − | Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy | + | * Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy |
| − | Adversarial Machine Learning and the role of AI in system security | + | * Adversarial Machine Learning and the role of AI in system security |
| − | Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework | + | * Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework |
Revision as of 13:11, 15 October 2021
| GameSec 2021 | |
|---|---|
Conference on Decision and Game Theory for Security
| |
| Ordinal | 12 |
| Event in series | GameSec |
| Dates | 2021/10/25 (iCal) - 2021/10/27 |
| Presence | online |
| Homepage: | https://www.gamesec-conf.org/ |
| Submitting link: | https://easychair.org/conferences/?conf=gamesec21 |
| Location | |
| Location: | Prague, Online |
| Important dates | |
| Abstracts: | 2021/08/09 |
| Papers: | 2021/08/16 |
| Submissions: | 2021/08/16 |
| Notification: | 2021/09/15 |
| Camera ready due: | 2021/09/22 |
| Table of Contents | |
The conference proceedings will be published by Springer as part of the LNCS series.
Conference Topics include (but are not restricted to):
GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:
- Game theory, control, and mechanism design for security and privacy
- Decision making for cybersecurity and security requirements engineering
- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
- Risk assessment and security risk management
- Security and privacy of wireless and mobile communications, including user location privacy
- Socio-technological and behavioral approaches to security
- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
- Adversarial Machine Learning and the role of AI in system security
- Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework