Difference between revisions of "Event:GameSec 2021"

From ConfIDent
(mobo import Concept___Fix_Online_Events-migrated)
(mobo import Concept___Events-migrated)
Line 4: Line 4:
 
|Ordinal=12
 
|Ordinal=12
 
|Type=Conference
 
|Type=Conference
|Submission deadline=2021/08/16
 
 
|Homepage=https://www.gamesec-conf.org/
 
|Homepage=https://www.gamesec-conf.org/
 
|wikicfpId=133363
 
|wikicfpId=133363
 
|City=Prague
 
|City=Prague
|Abstract deadline=2021/08/09
 
|Paper deadline=2021/08/16
 
|Notification=2021/09/15
 
|Camera ready=2021/09/22
 
 
|Submitting link=https://easychair.org/conferences/?conf=gamesec21
 
|Submitting link=https://easychair.org/conferences/?conf=gamesec21
 
|has general chair=Branislav Bosansky, Cleotilde Gonzalez
 
|has general chair=Branislav Bosansky, Cleotilde Gonzalez
Line 24: Line 19:
 
|Event Mode=online
 
|Event Mode=online
 
}}
 
}}
 +
{{Event Deadline
 +
|Abstract Deadline=2021/08/09
 +
|Paper Deadline=2021/08/16
 +
|Notification Deadline=2021/09/15
 +
|Camera-Ready Deadline=2021/09/22
 +
|Submission Deadline=2021/08/16
 +
}}
 +
{{S Event}}
 
The conference proceedings will be published by Springer as part of the LNCS series.
 
The conference proceedings will be published by Springer as part of the LNCS series.
  

Revision as of 19:39, 22 September 2022

Deadlines
2021-09-15
2021-08-09
2021-08-16
2021-09-22
2021-08-16
9
Aug
2021
Abstract
16
Aug
2021
Paper
16
Aug
2021
Submission
15
Sep
2021
Notification
22
Sep
2021
Camera-Ready
Venue

Prague

Loading map...

The conference proceedings will be published by Springer as part of the LNCS series.

Conference Topics include (but are not restricted to):

GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:

  • Game theory, control, and mechanism design for security and privacy
  • Decision making for cybersecurity and security requirements engineering
  • Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
  • Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
  • Risk assessment and security risk management
  • Security and privacy of wireless and mobile communications, including user location privacy
  • Socio-technological and behavioral approaches to security
  • Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
  • Adversarial Machine Learning and the role of AI in system security
  • Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework
Cookies help us deliver our services. By using our services, you agree to our use of cookies.