Difference between revisions of "GameSec 2021"
Jump to navigation
Jump to search
Line 24: | Line 24: | ||
GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics: | GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics: | ||
− | Game theory, control, and mechanism design for security and privacy | + | * Game theory, control, and mechanism design for security and privacy |
− | Decision making for cybersecurity and security requirements engineering | + | * Decision making for cybersecurity and security requirements engineering |
− | Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure | + | * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure |
− | Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems | + | * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems |
− | Risk assessment and security risk management | + | * Risk assessment and security risk management |
− | Security and privacy of wireless and mobile communications, including user location privacy | + | * Security and privacy of wireless and mobile communications, including user location privacy |
− | Socio-technological and behavioral approaches to security | + | * Socio-technological and behavioral approaches to security |
− | Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy | + | * Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy |
− | Adversarial Machine Learning and the role of AI in system security | + | * Adversarial Machine Learning and the role of AI in system security |
− | Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework | + | * Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework |
Revision as of 14:11, 15 October 2021
GameSec 2021 | |
---|---|
Conference on Decision and Game Theory for Security
| |
Ordinal | 12 |
Event in series | GameSec |
Dates | 2021/10/25 (iCal) - 2021/10/27 |
Presence | online |
Homepage: | https://www.gamesec-conf.org/ |
Submitting link: | https://easychair.org/conferences/?conf=gamesec21 |
Location | |
Location: | Prague, Online |
Important dates | |
Abstracts: | 2021/08/09 |
Papers: | 2021/08/16 |
Submissions: | 2021/08/16 |
Notification: | 2021/09/15 |
Camera ready due: | 2021/09/22 |
Table of Contents | |
The conference proceedings will be published by Springer as part of the LNCS series.
Conference Topics include (but are not restricted to):
GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:
- Game theory, control, and mechanism design for security and privacy
- Decision making for cybersecurity and security requirements engineering
- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
- Risk assessment and security risk management
- Security and privacy of wireless and mobile communications, including user location privacy
- Socio-technological and behavioral approaches to security
- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
- Adversarial Machine Learning and the role of AI in system security
- Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework