Call for Papers
Submission for full papers and submission for posters have both closed.
Thank you to all authors for your interest in GameSec.
GameSec 2016 invites posters presenting recent results or work in progress relevant to GameSec topics. The poster session will be treated as a primary session within the conference program.
The poster session submissions should be in the form of an abstract of up to one page. Abstracts must be submitted by email to the TPC Chairs Tansu Alpcan (tansu.alpcan(at)unimelb.edu.au) and Manos Panaousis (e.panaousis(at)brighton.ac.uk).
Submission will be evaluated by the program committee and appear in proceedings. However, they will not receive reviews. (Call for posters [PDF])
Call for papers is available for download [PDF].
|June 3, 2016||Abstract submission (optional)|
|June 17, 2016 (firm)||Paper submission|
|August 5, 2016||Full paper decision notification|
|August 14, 2016||Poster abstracts due|
|August 22, 2016||Poster decision notification|
|August 22, 2016||Camera-ready submission|
Special Track on "Validating Models"
The real world use of game- and decision-theoretic models in cyber and physical security applications requires validating them. Gathering and providing empirical evidence for or against such models is a crucial step in our field's progress. Unfortunately, it is often difficult to find a home for such pain-staking validation and empirical evidence gathering in conferences that are more focused on novelty of theoretical models and algorithms. To remedy this shortcoming, GameSec will include this year a special track on "validating models." Papers submitted to this special track will undergo the same rigorous evaluation as the normal GameSec submissions, but the emphasis will be on validation, data gathering and empirical evaluation, possibly of existing models.
Technical Program Committee
George Theodorakopoulos (Cardiff University)
Pasquale Malacaria (Queen Mary University of London)
Murat Kantarcioglu (University of Texas at Dallas)
Alvaro Cardenas (University of Texas at Dallas)
Athanasios Vasilakos (Prof. NTUA)
Jens Grossklags (Penn State University)
Mehrdad Nojoumian (Florida Atlantic University)
Nan Zhang (The George Washington University)
Aron Laszka (UC Berkeley)
Reza Shokri (UT Austin; Cornell NYC Tech)
David Pym (UCL)
Xinxin Liu (University of Florida)
Jun Zhuang (SUNY Buffalo)
Andrew Odlyzko (University of Minnesota)
Andrew Fielder (Imperial College London)
Yevgeniy Vorobeychik (Vanderbilt University)
Habtamu Abie (Norsk Regnesentral - Norwegian Computing Center)
Mohammad Hossein Manshaei (EPFL)
Pradeep Varakantham (Singapore Management University)
Sajal Das (Missouri University of Science and Technology)
Mark Felegyhazi (CrySyS Lab. BME)
Saurabh Amin (MIT)
Yezekael Hayel (University of Avignon - LIA/CERI)
Eduard A. Jorswieck (Tech. Univ. Dresden, Germany)
Anil Kumar Chorppath (Technical University of Munich)
Jean Leneutre (Telecom ParisTech )
Karl Henrik Johansson (KTH Royal Institute of Technology)
Yee Wei Law (University of South Australia)
We are grateful to our main supporter, National Science Foundation, for supporting the conference through the Secure and Trustworthy Cyberspace (SaTC) program.