GameSec 2014

Conference on Decision and Game Theory for Security

November 6-7, 2014, Los Angeles, CA, USA

Paper Submission

Submission page:

Submission instructions
Prospective authors are encouraged to submit a PDF version of their papers adhering to the Springer Lecture Notes in Computer Science (LNCS) format. Each submission should be previously unpublished work that is not currently under submission to another conference. Submissions can be (but do not have to be) anonymized. Full paper submissions are not to exceed 20 pages including references and well-formatted appendices. Full papers should make a strong technical contribution and adequately highlight the novel aspects of the work in relation to related research. Short paper submissions may present work in progress, novel applications and practice/industry experiences. Potential short papers will be evaluated based on their novelty and potential for sparking discussions and future collaborations. Short paper submissions are limited to 10 pages. Submission of both regular and short papers should be done by updating the files on EasyChair.

GameSec 2014 Proceedings

The conference proceedings published by Springer as part of the LNCS series are available here.

LNCS now offers the zero-cost option of giving registered conference participants and contributing authors (probably including those co-authors not being able to attend the actual meeting) temporary free access to the online version of the conference proceedings on SpringerLink by means of a multiple-user token. Access is granted for approximately four weeks, starting a few days before the conference.

List of Accepted Full Papers

  • Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
    Chao Zhang, Albert Xin Jiang, Martin Short, Jeffrey Brantingham and Milind Tambe.

  • Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
    Matthew Brown, William Haskell and Milind Tambe

  • Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
    Michael Wellman and Achintya Prakash

  • Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments
    Mhr Khouzani, Viet Pham and Carlos Cid

  • Optimal Contracts for Outsourced Computation
    Viet Pham, Mhr Khouzani and Carlos Cid

  • A Supervisory Control Approach to Dynamic Cyber-Security
    Mohammad Rasouli, Erik Miehling and Demosthenis Teneketzis

  • Numerical Computation of Multi-Goal Security Strategies
    Stefan Rass and Benjamin Rainer

  • Realizable Rational Multiparty Cryptographic Protocols
    John Ross Wallrabenstein and Chris Clifton

  • Limiting Adversarial Budget in Quantitative Security Assessment
    Aleksandr Lenin and Ahto Buldas

  • FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
    Aron Laszka, Gabor Horvath, Mark Felegyhazi and Levente Buttyan

  • Secure Message Delivery Games for Device-to-Device Communications
    Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni and Mauro Conti

  • A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary
    Abhishek Gupta, Tamer Başar and Galina Schwartz

  • Toward Optimal Network Topology Design for Fast and Secure Distributed Computation
    Ji Liu and Tamer Basar

  • An Economic Model of App Adoption Decisions on Networks with Interdependent Privacy Consequences
    Yu Pu and Jens Grossklags

  • Cybersecurity Games and Investments: A Decision Support Approach
    Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin and Fabrizio Smeraldi

  • Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Brahim Djebaili, Christophe Kiennert, Jean Leneutre and Lin Chen

List of Accepted Short Papers/Posters

  • Adversary Modeling in Stackelberg Security Games
    Jinshu Cui and Richard John

  • A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
    Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani and Quanyan Zhu

  • Can Less Be More? A Game-Theoretical Analysis of Investment vs. Filtering
    Armin Sarabi, Parinaz Naghizadeh and Mingyan Liu

  • Online Learning Methods for Border Patrol Resource Allocation
    Richard Klima, Christopher Kiekintveld and Viliam Lisy

  • A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods
    Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty and Alefiya Hussain

  • Testing for Hardware Trojans: A Game-Theoretic Approach
    Charles Kamhoua, Manuel Rodriguez and Kevin Kwiat

  • Surveillance for Security as a Pursuit-Evasion Game
    Sourabh Bhattacharya, Tamer Başar and Maurizio Falcone