(mobo import Concept___Event_For_Confident-migrated) |
m (Text replacement - "Homepage=" to "Official Website=") |
||
(8 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
|Title=11th Conference on Decision and Game Theory for Security | |Title=11th Conference on Decision and Game Theory for Security | ||
|Type=Conference | |Type=Conference | ||
− | | | + | |Official Website=https://www.gamesec-conf.org/ |
− | |||
− | |||
|gndId=1226117643 | |gndId=1226117643 | ||
|DblpConferenceId=gamesec/gamesec2020.html | |DblpConferenceId=gamesec/gamesec2020.html | ||
|City=College Park | |City=College Park | ||
− | | | + | |Region=Maryland |
− | | | + | |Submission Link=https://easychair.org/my/conference?conf=gamesec2020 |
− | |||
− | |||
− | |||
− | |||
− | |||
|has general chair=John S. Baras, Radha Poovendran | |has general chair=John S. Baras, Radha Poovendran | ||
|has program chair=Quanyan Zhu | |has program chair=Quanyan Zhu | ||
− | |||
− | |||
− | |||
|has Proceedings Link=https://www.https://link.springer.com/book/10.1007/978-3-030-64793-3.com/de/book/9783030647926 | |has Proceedings Link=https://www.https://link.springer.com/book/10.1007/978-3-030-64793-3.com/de/book/9783030647926 | ||
|has Proceedings DOI=https://doi.org/10.1007/978-3-030-64793-3 | |has Proceedings DOI=https://doi.org/10.1007/978-3-030-64793-3 | ||
Line 31: | Line 21: | ||
|Start Date=2020/10/28 | |Start Date=2020/10/28 | ||
|End Date=2020/10/30 | |End Date=2020/10/30 | ||
+ | |Academic Field=Computer Networking | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=online | ||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Abstract Deadline=2020/06/22 | ||
+ | |Notification Deadline=2020/08/10 | ||
+ | |Camera-Ready Deadline=2020/09/07 | ||
+ | |Submission Deadline=2020/06/29 | ||
+ | }} | ||
+ | {{Event Metric | ||
+ | |Number Of Submitted Papers=29 | ||
+ | |Number Of Accepted Papers=21 | ||
+ | |Number Of Accepted Short Papers=2 | ||
+ | }} | ||
+ | {{S Event}} | ||
* Softcover ISBN 978-3-030-64792-6 | * Softcover ISBN 978-3-030-64792-6 | ||
* eBook ISBN 978-3-030-64793-3 | * eBook ISBN 978-3-030-64793-3 | ||
Line 62: | Line 67: | ||
==Organizers== | ==Organizers== | ||
− | '''General | + | '''General Chairs''' |
* John S. Baras (University of Maryland) | * John S. Baras (University of Maryland) | ||
* Radha Poovendran (University of Washington) | * Radha Poovendran (University of Washington) | ||
− | '''TPC | + | '''TPC Chair''' |
* Quanyan Zhu (New York University) | * Quanyan Zhu (New York University) |
Latest revision as of 13:33, 19 October 2022
|
||
Abstract |
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
College Park, Maryland
- Softcover ISBN 978-3-030-64792-6
- eBook ISBN 978-3-030-64793-3
2020 Conference on Decision and Game Theory for Security
Due to COVID-19 pandemic the conference was held virtually
Important Dates
- Abstract (optional): June 22nd, 2020
- Submission: June 29th, 2020
- Decision notification: August 10th, 2020
- Camera-ready: September 7th, 2020
GameSec 2020 and Covid-19 (important): The GameSec 2020 leadership team is actively monitoring the COVID-19 situation to ensure the safety, comfort and quality of experience for attendees and a successful course of the event. The GameSec 2020 leadership team is committed to holding the conference in 2020 as planned. In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation.
TOPICS
Conference Topics include (but are not restricted to): GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:'Kursiver Text'
- Game theory, control, and mechanism design for security and privacy
- Decision making for cybersecurity and security requirements engineering
- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
- Risk assessment and security risk management
- Security and privacy of wireless and mobile communications, including user location privacy
- Socio-technological and behavioral approaches to security
- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
- Adversarial Machine Learning and the role of AI in system security
- Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework
Organizers
General Chairs
- John S. Baras (University of Maryland)
- Radha Poovendran (University of Washington)
TPC Chair
- Quanyan Zhu (New York University)