Difference between revisions of "GameSec 2021"

From Openresearch
Jump to navigation Jump to search
Line 17: Line 17:
 
|Camera ready=2021/09/22
 
|Camera ready=2021/09/22
 
|Submitting link=https://easychair.org/conferences/?conf=gamesec21
 
|Submitting link=https://easychair.org/conferences/?conf=gamesec21
|has general chair=Branislav Bosansky, Cleotilde Gonzales
+
|has general chair=Branislav Bosansky, Cleotilde Gonzalez
 
}}
 
}}
 
The conference proceedings will be published by Springer as part of the LNCS series.
 
The conference proceedings will be published by Springer as part of the LNCS series.

Revision as of 14:13, 15 October 2021

GameSec 2021
Conference on Decision and Game Theory for Security
Ordinal 12
Event in series GameSec
Dates 2021/10/25 (iCal) - 2021/10/27
Presence online
Homepage: https://www.gamesec-conf.org/
Submitting link: https://easychair.org/conferences/?conf=gamesec21
Location
Location: Prague, Online
Loading map...

Important dates
Abstracts: 2021/08/09
Papers: 2021/08/16
Submissions: 2021/08/16
Notification: 2021/09/15
Camera ready due: 2021/09/22
Committees
General chairs: Branislav Bosansky, Cleotilde Gonzalez
Table of Contents



The conference proceedings will be published by Springer as part of the LNCS series.

Conference Topics include (but are not restricted to):

GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:

  • Game theory, control, and mechanism design for security and privacy
  • Decision making for cybersecurity and security requirements engineering
  • Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
  • Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
  • Risk assessment and security risk management
  • Security and privacy of wireless and mobile communications, including user location privacy
  • Socio-technological and behavioral approaches to security
  • Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
  • Adversarial Machine Learning and the role of AI in system security
  • Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework