GameSec 2011

Conference on Decision and Game Theory for Security

November 14-15, 2011, College Park, Maryland, USA

2011 Conference on Decision and Game Theory for Security

Photo: DC Captical GameSec 2011, the second Conference on Decision and Game Theory for Security will take place on the campus of the University of Maryland, College Park, on November 14-15, 2011, under the sponsorships of the Maryland Cybersecurity Center (MC2) and other technical sponsors.


  • GameSec 2012 will be held on November 5-6, 2012 in Budapest, Hungary. More information will be provided later.
  • We are very pleased to announce that Dr. Carl Landwehr, Director of the Trustworthy Computing Program at the National Science Foundation, will be the keynote speaker at the Banquet of GameSec 2011. The title and abstract of his lecture are:
    Cybersecurity -- How did we get here and where are we going?
    Download Abstract
  • We are very pleased to announce that thanks to the funding received from our sponsors we will be able to support a limited number of people with partial financial support to attend the GameSec 2011 Conference. We will be able to support up to 20 people, with a maximum financial support per person up to $1,500, although the typical award will be smaller. Preference will be given to young researchers and PhD students that are authors of papers accepted to GameSec 2011. PhD students who are not authors of GameSec 2011 papers can also apply.
    Application Deadline: October 5, 2011 (Wednesday, 23:59 EST).
    Decision Announcement: October 7, 2011 (Friday).
    Please visit here for more information.


Securing complex and networked systems and managing associated risks become increasingly important as they play an indispensible role in modern life at the turn of the information age. Concurrently, security of ubiquitous communication, data, and computing pose novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network interdependencies as well as human and social factors. It involves decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. For example, the resources vary from bandwidth, computing, and energy at the machine level to manpower and scheduling at the organizational level.

The GameSec conference aims to bring together researchers who aim to establish a theoretical foundation for making resource allocation decisions that balance available capabilities and perceived security risks in a principled manner. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.

Conference Topics

Topics of interest include (but are not limited to):

  • Security games
  • Security and risk management
  • Mechanism design and incentives in security
  • Decentralized security algorithms
  • Security of networked systems
  • Security of Web-based services and social networks
  • Intrusion and anomaly detection
  • Resource allocation for security
  • Optimized response to malware
  • Identity management
  • Privacy and security
  • Reputation and trust
  • Infrastructure security
  • Security and trust in safety critical systems
  • Supply chain security management
  • Evolution, biology, security and trust
  • Virtualization and security
  • Composite trust in man-machine systems
  • Security in control and inference systems
  • Security and trust in the future Internet
  • Information security and watermarking
  • Physical layer security in wireless networks
  • Information theoretic aspects of security
  • Adversarial machine learning
  • Distributed learning for security
  • Cross-layer security
  • Usability and security
  • Human behavior, security and trust
  • Dynamic control of security systems
  • Organizational aspects of risk management
  • Cooperation and competition in security
  • Composable security
  • Security economics
  • Health care IT security and privacy
  • Statistical mechanics games and security
  • Hardware-software co-design for security
  • Multimedia security
  • Security and trust metrics, measurements and standards
  • and more...


We thank all our sponsors for their kind support.