[PET] CFP: 6th Conference on Decision and Game Theory for Security (GameSec 2015)

Dr. Mauro Conti conti at math.unipd.it
Sat Feb 7 13:08:16 GMT 2015


-----------------------------------------------------------
                      CALL FOR PAPERS

   6th Conference on Decision and Game Theory for Security

                      (GameSec 2015)
               November 4-5, 2015, London, UK

                http://www.gamesec-conf.org/


                      IMPORTANT DATES

     Abstract submission:     June 1, 2015, 11:59pm CET
     Paper submission:        June 8, 2015, 11:59pm CET
     Decision notification:   July 29, 2015, 11:59pm
     Camera-ready submission: August 25, 2015, 11:59pm

-----------------------------------------------------------

SCOPE AND OVERVIEW
------------------

Nations, corporations, and individuals constantly need to reason about how
to protect their sensitive assets in order to ensure economic growth and
prosperity. Decision making for security and privacy of infrastructure and
information needs a scientific framework that can handle challenges
arising from modern-day heterogeneous, dynamic, and large-scale systems.

GameSec solicits theoretical and practical contributions towards a science
of decision making in security. In particular, GameSec publishes papers
that apply decision and game theory, as well as related techniques such as
dynamic control and mechanism design, to build resilient, secure, and
dependable networked systems.

The goal of GameSec is to bring together academic and industrial
researchers in an effort to identify and discuss the major technical
challenges and recent results that highlight the connection between game
theory, control, distributed optimization, economic incentives and real
world security, reputation, trust and privacy problems in a variety of
technological systems.

Submissions should solely be original research papers that have neither
been published nor submitted for publication elsewhere.

Main Topics:
* Game theory and mechanism design for security and privacy
* Pricing and economic incentives for building dependable and secure
systems
* Dynamic control, learning, and optimization and approximation techniques
* Decision making and decision theory for cybersecurity and security
requirements engineering
* Socio-technological and behavioral approaches to security
* Risk assessment and risk management
* Security investment and cyber insurance
* Security and privacy for the Internet-of-Things, cyber-physical systems,
resilient control systems
* New approaches for security and privacy in cloud computing and for
critical infrastructure
* Security and privacy of wireless and mobile communications, including
user location privacy
* Game theory for intrusion detection
* Empirical and experimental studies with game-theoretic or optimization
analysis for security and privacy



SUBMISSION INSTRUCTIONS
-----------------------
Prospective authors are encouraged to submit a PDF version of their papers
adhering to the Springer Lecture Notes in Computer Science (LNCS) format.
Each submission should be previously unpublished work that is not
currently under submission to another conference. Submissions can be (but
do not have to be) anonymized. Full paper submissions are not to exceed 20
pages including references and well-formatted appendices. Full papers
should make a strong technical contribution and adequately highlight the
novel aspects of the work in relation to related research. Short paper
submissions may present work in progress, novel applications and
practice/industry experiences. Potential short papers will be evaluated
based on their novelty and potential for sparking discussions and future
collaborations. Short paper submissions are limited to 10 pages.
Submission of both regular and short papers should be done by updating the
files on EasyChair.


IMPORTANT DATES
---------------
Abstract submission:      June 1,    2015, 11:59pm CET
Paper submission:         June 8,    2015, 11:59pm CET
Decision notification:    July 29,   2015, 11:59pm CET
Camera-ready submission:  August 25, 2015, 11:59pm CET


ORGANIZERS
----------
General Chair:      Manos Panaousis (University of Brighton, UK)
TPC Chair:          George Theodorakopoulos (Cardiff University, UK)
Publication Chair:  Arman (MHR.) Khouzani (Royal Holloway, University of 
London, UK)
Local Arrangements and Registration Chair:
                     Andrew Fielder (Imperial College London, Institute 
for Security Science and Technology, UK)
Publicity Chairs
   Asia-Pacific:     Benjamin Rubinstein (The University of Melbourne, AUS)
   Europe:           Mauro Conti (University of Padua, IT)
   US:               Aron Laszka (Vanderbilt University, US)
Web Chair:          Johannes Pohl (University of Applied Sciences 
Stralsund, GER)




-- 

Please help us improving our CAPTCHaStar...
   taking part in our survey: http://starcaptcha.math.unipd.it/

--

Mauro Conti, PhD
Associate Professor - EU Marie Curie Fellow

University of Padua
Department of Mathematics
SPRITZ - Security and Privacy Research Group
Via Trieste, 63 - 35121, Padua, Italy
Room  : 528
Phone : +39 049 827 1488
Fax   : +39 049 827 1479
email : conti at math.unipd.it
web   : http://www.math.unipd.it/~conti/
            http://spritz.math.unipd.it/



More information about the PET mailing list