9h15-9h30 | Opening | |
9h30-10h30 | Plenary: "Towards Trustworthy Autonomous AI-Driven Systems" | Yevgeniy Vorobeychik |
10h30-11h00 | Coffee Break | |
11h00-12h30 | Session 1 : Mechanism design and imperfect information | Chair: Y. Hayel |
11h00-11h30 | Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks | Sonja Johnson-Yu, Jessica Finocchiaro, Arunesh Sinha, Kai Wang, Yevgeniy Vorobeychik, Aparna Taneja and Milind Tambe |
11h30-12h00 | Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance | Zhen Li and Qi Liao |
12h00-12h30 | Rule Enforcing Through Ordering | David Sychrovský, Sameer Desai and Martin Loebl |
12h30-14h00 | Lunch | |
14h00-15h30 | Session 2 : Security Games | Chair: T. Kroupa |
14h00-14h30 | Multi-defender Security Games with Schedules | Zimeng Song, Chun Kai Ling and Fei Fang |
14h30-15h00 | Asymmetric Centrality Game against Network Epidemic Propagation | Arnold Willie Kouam Kounchou, Yezekael Hayel, Gabriel DeugouÉ, Olivier Tsemogne and Charles Kamhoua |
15h00-15h30 | Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles | Eckhard Pfluegel |
15h30-16h00 | Coffee Break | |
16h00-17h30 | Session 3 : Learning in security games | Chair : S. Rass |
16h00-16h30 | Observable Perfect Equilibrium | Sam Ganzfried ( YouTube link) |
16h30-17h00 | Quantisation Effects in Adversarial Cyber-Physical Games | Takuma Adams, Andrew Cullen and Tansu Alpcan |
17h00-17h30 | Scalable Learning of Intrusion Responses through Recursive Decomposition | Kim Hammar and Rolf Stadler |
9h30-10h30 | Plenary: "The True Colors of Memory: A Tour of Chromatic-Memory Strategies in Zero-Sum Games on Graphs" | Patricia Bouyer-Decitre |
10h30-11h00 | Coffee Break | |
11h00-12h30 | Session 4 : Cyber deception | Chair: F. De Pellegrini |
11h00-11h30 | Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach | Md Abu Sayed, Ahmed H. Anwar Hemida, Christopher Kiekintveld and Charles Kamhoua |
11h30-12h00 | Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs | Haoxiang Ma, Shuo Han, Chales Kamhoua and Jie Fu |
12h00-12h30 | The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense | Ryan Gabrys, Mark Bilinski, Sonia Cromp and Fred Sala |
12h30-14h00 | Lunch | |
14h00-15h30 | Session 5 : Economics of security | Chair: T. Alpcan |
14h00-14h30 | Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost | Shivakumar Mahesh, Nicholas Bishop, Le Cong Dinh and Long Tran-Thanh |
14h30-15h00 | Rational Broadcast Protocols against Timid Adversaries | Keigo Yamashita and Kenji Yasunaga |
15h00-15h30 | FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks | Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Djamegni Tayou, Ahmed H. Anwar, Deepak K. Tosh and Charles Kamhoua |
15h30-16h00 | Coffee Break | |
16h00-17h30 | Poster Session | |
16h00-17h30 | Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code | Stefan Rass and Martin Pinzger |
16h00-17h30 | Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation | Cheng Kuang Wu |
16h00-17h30 | Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception | Martin Waffo Kemgne, Serge Olivier Tsemogne Kamguia and Charles Alexandre Kamhoua |
16h00-17h30 | Solving security models with perfect observability | Paolo Zappalà, Amal Benhamiche, Matthieu Chardy, Francesco De Pellegrini and Rosa Figueiredo |
17h00-17h30 | Steering Committee meeting | |