2016 Conference on Decision and Game Theory for Security
GameSec 2016, the seventh Conference on Decision and Game Theory for Security will take place in New York, NY, USA, on November 2-4, 2016.
Call for papers is available for download [PDF].
Submission is now open on Easy Chair!
Travel grants will be available for GameSec 2016.
Special Track on "Validating Models"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models." Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.
Nations, corporations, and individuals constantly need to reason about how to protect their sensitive assets in order to ensure economic growth and prosperity. Decision making for security and privacy of infrastructure and information needs a scientific framework that can handle challenges arising from modern-day heterogeneous, dynamic, and large-scale systems.
GameSec solicits theoretical and practical contributions towards a science of decision making in security. In particular, GameSec publishes papers that apply decision and game theory, as well as related techniques such as dynamic control and mechanism design, to build resilient, secure, and dependable networked systems.
The goal of GameSec is to bring together academic and indus- trial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems in a variety of technological systems. Submissions should solely be original research papers that have neither been published nor submitted for publication elsewhere.
To be announced.
We are grateful to our main supporter, National Science Foundation, for supporting the conference through the Secure and Trustworthy Cyberspace (SaTC) program.