(* apologies for cross-postings *) CALL FOR PAPERS The 12th Conference on Decision and Game Theory for Security =========================================================== Modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing the security of the emerging systems, many of them safety critical, poses significant challenges. The **12th Conference on Decision and Game Theory for Security** will take place from **October 25-27, 2021 as an online event**, jointly organized by the Czech Technical University in Prague and Carnegie Mellon University. It focuses on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically relevant analytical methods. GameSec 2021 invites novel, high-quality theoretical and practically relevant contributions, which apply decision and game theory to security problems. The goal of the conference is to bring together academic, government, and industrial researchers in an effort to identify and discuss the major challenges and recent results that highlight the connections between game theory, control, distributed optimization, machine learning, economic incentives, real-world security, reputation, trust and privacy problems. This year, GameSec 2021 provides a special track. **Special Track on "Behavioral Decision and Game Theory"** Game theory traditionally presumes a utility maximization paradigm in the prediction of behavior, yet empirical research shows that humans follow more complex patterns of behavior. Comprehensive security needs to address the human factor, since security highly depends on human-machine teaming and human understanding, adherence and trust on security mechanisms. This track invites research that addresses behavioral aspects of decision and game theory relevant to security models, including models of human behavior, and experimental approaches to security. **Call for Demos** This year's conference will introduce a special session for work in progress that may not yet have reached a level of maturity to submit a full research paper, but nonetheless may show some nice algorithms or implementation to discuss with fellows from the community. We explicitly invite people to show their ongoing work at the conference, such as new or updated algorithms, implementations, etc. in a live session or pre-recorded video of at most 10min. Topics are as for the main conference, with the focus here being on practical matters of computation in game theory. The goal is to generate interest and get informed about practical solutions and computational methods in game theory, seeing them at work in addition to reading about them in research papers. For the submission link, see the respective instructions below. Submission Guidelines for Papers -------------------------------- Each submission should be previously unpublished work that is not currently under submission to another conference. Submissions can be (but do not have to be) anonymized. **Full paper** submissions are not to exceed **20 pages** including references and well-formatted appendices. Full papers should make a strong technical contribution and adequately highlight the novel aspects of the work in relation to related research. **Short paper submissions** may present work in progress, novel applications and practice/industry experiences. Potential short papers will be evaluated based on their novelty and potential for sparking discussions and future collaborations. Short paper submissions are limited to **12 pages**. Submission of both regular and short papers should be done by updating the files on EasyChair. ### **Submission instructions** Prospective authors are encouraged to register their paper by uploading title, authors, and a short abstract (a few hundred words, not an extended abstract) by the abstract submission deadline, 23:59 PST time. Then, authors can update the title, authors, abstract and submit a PDF file with the full paper by the full paper submission deadline, 23:59 PST time. Submitting an abstract is not mandatory. Authors can still submit a full paper by the final deadline without having previously submitted an abstract. *For submissions to the special track, please add the line [Submission to the special track "Behavioral Decision and Game Theory."] as the first words in the paper's abstract, and submit it like a regular paper (this annotation will be automatically removed for the camera ready version by the editors).* **Submission Link:** ### Paper Preparation All submissions must adhere to the Springer's [Lecture Notes in Computer Science (LNCS)](http://www.springer.com/computer/lncs "Springer LNCS") format. For a detailed description, please consult the [Author Guidelines for the Preparation of Contributions to Springer Computer Science Proceedings](ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/instruct/authors/ authors.pdf "LNCS Author Guidelines (pdf)") (version of 26-FEB-2015 in PDF). The [LaTex2e template](ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip "llncs2e.zip") which supports hyperlinks for the online versions can be downloaded (in zip format). As a sample, the [source files of the Author Instructions](ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/instruct/authors /typeinst.zip "typeinst.zip.") are also made available by Springer. Although discouraged to use, template files for [Office 2007 Word](ftp://ftp.springer.de/pub/tex/latex/llncs/word/splnproc1110.zip "SPLNPROC Word 2007-2010 (splnproc1110.zip)") and [Office 2003 Word](http://static.springer.com/sgw/documents/1124637/application/zip/CSProceed ings_AuthorTools_Word_2003.zip "CS Proceedings_Author Tools_Word 2003 (last update: April 19, 2011) (zip, 229 kB)") are also provided. The authors are advised to carefully read the explanatory typing instruction documents contained within the corresponding archive file. Please note that the wide empty margins are to be expected. The LNCS series will be published in a smaller than A4 cut, and hence the margins will be rectified by the publisher. Authors should consult Springer's [authors' guidelines](ftp://ftp.springernature.com/cs-proceeding/svproc/guidelines/Springe r_Guidelines_for_Authors_of_Proceedings.pdf) and use their proceedings templates, either for [LaTeX](ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip) or for [Word](ftp://ftp.springernature.com/cs-proceeding/llncs/word/splnproc1703.zip), for the preparation of their papers. Springer encourages authors to include their [ORCIDs](https://goo.gl/hbsa4D) in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Submission Guidelines for Demos ------------------------------- For the submission, please fill out this form with basic information about the planned demonstration. The abstracts will be reviewed by the TPC and Conference chairs, but will not appear in the proceedings. Instead, they will be put on the conference website, with an optional link to your demonstration video. **Demo Submission Link:** https://forms.gle/NdBHmXyMSz27sarQ7 Important Dates --------------- - Abstract submission (optional): August 9th, 2021 - **Submissions (all kinds): August 16th, 2021** - **Decision notification: September 12th, 2021** - Camera-ready submission: September 19th, 2021 - Conference: October 25 -- October 27, 2021 List of Topics -------------- - Game theory and mechanism design for security and privacy - Decision making and decision theory for cybersecurity and security requirements engineering - Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems - Pricing and economic incentives for building dependable and secure systems - Risk assessment and security risk management - Security investment and cyber insurance - New approaches for security and privacy in cloud computing and for critical infrastructure - Security and privacy of wireless and mobile communications, including user location privacy - Dynamic control, learning, and optimization and approximation - Socio-technological and behavioral approaches to security - Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy Committees ---------- ### Organizing committee - Branislav Bošanský (Czech Technical University in Prague) - Cleotilde Gonzalez (Carnegie Mellon University) - Stefan Rass (Universitaet Klagenfurt) - Arunesh Sinha (Singapore Management University) - Charles Kamhoua (Army Research Laboratory) - Petr Benda (Czech Technical University in Prague) Invited Speakers ---------------- - Vincent Conitzer, Duke University, USA - Lorrie Cranor, Carnegie Mellon University, USA Publication ----------- GameSec21 proceedings will be published in [Springer Lecture Notes of Computer Science](https://link.springer.com/conference/gamesec) Contact ------- All questions about submissions should be emailed to Arunesh SINHA or Stefan RASS