GAMESEC 2012 - 2012 Conference on Decision and Game Theory for Security
View: 3097
Website www.gamesec-conf.org |
Edit Freely
Category Game Theory
Deadline: July 25, 2012 | Date: November 05, 2012-November 06, 2012
Venue/Country: Budapest, Hungary
Updated: 2011-11-28 14:39:43 (GMT+9)
Call For Papers - CFP
Securing complex and networked systems and managing associated risks become increasingly important as they play an indispensible role in modern life at the turn of the information age. Concurrently, security of ubiquitous communication, data, and computing pose novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network interdependencies as well as human and social factors. It involves decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. For example, the resources vary from bandwidth, computing, and energy at the machine level to manpower and scheduling at the organizational level.The GameSec conference aims to bring together researchers who aim to establish a theoretical foundation for making resource allocation decisions that balance available capabilities and perceived security risks in a principled manner. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.Topics of interest include (but are not limited to):Security gamesSecurity and risk managementMechanism design and incentives in securityDecentralized security algorithmsSecurity of networked systemsSecurity of Web-based services and social networksIntrusion and anomaly detectionResource allocation for securityOptimized response to malwareIdentity managementPrivacy and securityReputation and trustInfrastructure securitySecurity and trust in safety critical systemsSupply chain security managementEvolution, biology, security and trustVirtualization and securityComposite trust in man-machine systemsSecurity in control and inference systemsSecurity and trust in the future InternetInformation security and watermarkingPhysical layer security in wireless networksInformation theoretic aspects of securityAdversarial machine learningDistributed learning for securityCross-layer securityUsability and securityHuman behavior, security and trustDynamic control of security systemsOrganizational aspects of risk managementCooperation and competition in securityComposable securitySecurity economicsHealth care IT security and privacyStatistical mechanics games and securityHardware-software co-design for securityMultimedia securitySecurity and trust metrics, measurements and standardsand more...
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.