(mobo import Concept___Fix_Online_Events-migrated) |
m (Text replacement - "|State=" to "|Region=") |
||
Line 8: | Line 8: | ||
|DblpConferenceId=gamesec/gamesec2020.html | |DblpConferenceId=gamesec/gamesec2020.html | ||
|City=College Park | |City=College Park | ||
− | | | + | |Region=Maryland |
|Abstract deadline=2020/06/22 | |Abstract deadline=2020/06/22 | ||
|Notification=2020/08/10 | |Notification=2020/08/10 |
Revision as of 09:19, 15 September 2022
- Softcover ISBN 978-3-030-64792-6
- eBook ISBN 978-3-030-64793-3
2020 Conference on Decision and Game Theory for Security
Due to COVID-19 pandemic the conference was held virtually
Important Dates
- Abstract (optional): June 22nd, 2020
- Submission: June 29th, 2020
- Decision notification: August 10th, 2020
- Camera-ready: September 7th, 2020
GameSec 2020 and Covid-19 (important): The GameSec 2020 leadership team is actively monitoring the COVID-19 situation to ensure the safety, comfort and quality of experience for attendees and a successful course of the event. The GameSec 2020 leadership team is committed to holding the conference in 2020 as planned. In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation.
TOPICS
Conference Topics include (but are not restricted to): GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:'Kursiver Text'
- Game theory, control, and mechanism design for security and privacy
- Decision making for cybersecurity and security requirements engineering
- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
- Risk assessment and security risk management
- Security and privacy of wireless and mobile communications, including user location privacy
- Socio-technological and behavioral approaches to security
- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
- Adversarial Machine Learning and the role of AI in system security
- Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework
Organizers
General Chairs
- John S. Baras (University of Maryland)
- Radha Poovendran (University of Washington)
TPC Chair
- Quanyan Zhu (New York University)