Paper Submission
Submission page: https://www.easychair.org/conferences/?conf=gamesec14
Submission instructions
Prospective authors are encouraged to submit a PDF version of their papers adhering to the Springer Lecture Notes in Computer Science (LNCS) format. Each submission should be previously unpublished work that is not currently under submission to another conference. Submissions can be (but do not have to be) anonymized. Full paper submissions are not to exceed 20 pages including references and well-formatted appendices. Full papers should make a strong technical contribution and adequately highlight the novel aspects of the work in relation to related research. Short paper submissions may present work in progress, novel applications and practice/industry experiences. Potential short papers will be evaluated based on their novelty and potential for sparking discussions and future collaborations. Short paper submissions are limited to 10 pages. Submission of both regular and short papers should be done by updating the files on EasyChair.
GameSec 2014 Proceedings
The conference proceedings published by Springer as part of the LNCS series are available here.
LNCS now offers the zero-cost option of giving registered conference participants and contributing authors (probably including those co-authors not being able to attend the actual meeting) temporary free access to the online version of the conference proceedings on SpringerLink by means of a multiple-user token. Access is granted for approximately four weeks, starting a few days before the conference.
List of Accepted Full Papers
-
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
Chao Zhang, Albert Xin Jiang, Martin Short, Jeffrey Brantingham and Milind Tambe.
-
Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
Matthew Brown, William Haskell and Milind Tambe
-
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
Michael Wellman and Achintya Prakash
-
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments
Mhr Khouzani, Viet Pham and Carlos Cid
-
Optimal Contracts for Outsourced Computation
Viet Pham, Mhr Khouzani and Carlos Cid
-
A Supervisory Control Approach to Dynamic Cyber-Security
Mohammad Rasouli, Erik Miehling and Demosthenis Teneketzis
-
Numerical Computation of Multi-Goal Security Strategies
Stefan Rass and Benjamin Rainer
-
Realizable Rational Multiparty Cryptographic Protocols
John Ross Wallrabenstein and Chris Clifton
-
Limiting Adversarial Budget in Quantitative Security Assessment
Aleksandr Lenin and Ahto Buldas
-
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
Aron Laszka, Gabor Horvath, Mark Felegyhazi and Levente Buttyan
-
Secure Message Delivery Games for Device-to-Device Communications
Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni and Mauro Conti
-
A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary
Abhishek Gupta, Tamer Başar and Galina Schwartz
-
Toward Optimal Network Topology Design for Fast and Secure Distributed Computation
Ji Liu and Tamer Basar
-
An Economic Model of App Adoption Decisions on Networks with Interdependent Privacy Consequences
Yu Pu and Jens Grossklags
-
Cybersecurity Games and Investments: A Decision Support Approach
Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin and Fabrizio Smeraldi
-
Data Integrity and Availability Verification Game in Untrusted Cloud Storage
Brahim Djebaili, Christophe Kiennert, Jean Leneutre and Lin Chen
List of Accepted Short Papers/Posters
-
Adversary Modeling in Stackelberg Security Games
Jinshu Cui and Richard John
-
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani and Quanyan Zhu
-
Can Less Be More? A Game-Theoretical Analysis of Investment vs. Filtering
Armin Sarabi, Parinaz Naghizadeh and Mingyan Liu
-
Online Learning Methods for Border Patrol Resource Allocation
Richard Klima, Christopher Kiekintveld and Viliam Lisy
-
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods
Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty and Alefiya Hussain
-
Testing for Hardware Trojans: A Game-Theoretic Approach
Charles Kamhoua, Manuel Rodriguez and Kevin Kwiat
-
Surveillance for Security as a Pursuit-Evasion Game
Sourabh Bhattacharya, Tamer Başar and Maurizio Falcone