posted by organizer: tiffanyyzh || 3773 views || tracked by 6 users: [display]

GameSec 2022 : Conference on Decision and Game Theory for Security

FacebookTwitterLinkedInGoogle


Conference Series : Decision and Game Theory for Security
 
Link: https://www.gamesec-conf.org/index.php
 
When Oct 26, 2022 - Oct 28, 2022
Where Pittsburgh
Abstract Registration Due Jul 6, 2022
Submission Deadline Jul 13, 2022
Notification Due Aug 31, 2022
Final Version Due Sep 14, 2022
Categories    game theory   security   artificial intelligence   behavioral science
 

Call For Papers

CALL FOR PAPERS

*** GameSec22: The 13th Conference on Decision and Game Theory for Security ***
===========================================================

Pittsburgh, Pennsylvania, October 26-28, 2022
Abstract deadline (optional): 7/6/2022
Submission deadline: 7/13/2022
Submission link: https://easychair.org/my/conference?conf=gamesec22
Submission instructions: https://www.gamesec-conf.org/papers.php
Topics: game theory, security, artificial intelligence, behavioral science


Modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing the security of the emerging systems, many of them safety critical, poses significant challenges. The 13th Conference on Decision and Game Theory for Security (GameSec-22) will take place on October 26-28, 2022 in Pittsburgh, Pennsylvania, USA. It focuses on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically relevant analytical methods.

GameSec 2022 invites novel, high-quality theoretical and practically relevant contributions, which apply decision and game theory to security problems. The goal of the conference is to bring together academic, government, and industrial researchers in an effort to identify and discuss the major challenges and recent results that highlight the connections between game
theory, control, distributed optimization, machine learning, economic incentives, real-world security, reputation, trust and privacy problems.

GameSec-22 is planned to be a physical event. Requests of remote attendance, e.g., due to visa issues or travel restrictions, may be accommodated if necessary. For more travel details, including the up-to-date Covid regulations, please refer to https://www.gamesec-conf.org/travel.php.


Paper Submission Guideline
--------------------------------

Each submission should be previously unpublished work that is not currently
under submission to another conference. Submissions can be (but do not have to
be) anonymized. **Full paper** submissions are not to exceed **20 pages**
including references and well-formatted appendices. Full papers should make a
strong technical contribution and adequately highlight the novel aspects of
the work in relation to related research.

### **Submission instructions**

Prospective authors are encouraged to register their paper by uploading title,
authors, and a short abstract (a few hundred words, not an extended abstract)
by the abstract submission deadline, 23:59 PST time. Then, authors can update
the title, authors, abstract and submit a PDF file with the full paper by the
full paper submission deadline, 23:59 PST time. Submitting an abstract is not
mandatory. Authors can still submit a full paper by the final deadline without
having previously submitted an abstract.

### Paper Preparation

All submissions must adhere to the Springer's Lecture Notes in Computer
Science (LNCS) format (https://www.springer.com/gp/computer-science/lncs).
For a detailed description, please consult the Author Guidelines for the
Preparation of Contributions to Springer Computer Science
Proceedings (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19242230/data/v9).
The LaTex2e template which supports hyperlinks for the online versions can be
downloaded (in zip format) at ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip. As a sample, the source files of the Author
Instructions (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19238648/data/v4) are also made available by Springer. Although
discouraged to use, template files for Office 2007
Word (https://resource-cms.springernature.com/springer-cms/rest/v1/content/19238706/data/v1) and Office 2003
Word (https://resource-cms.springernature.com/springer-cms/rest/v1/content/7117506/data/v1) are also provided.

The authors are advised to carefully read the explanatory typing instruction
documents contained within the corresponding archive file. Please note that
the wide empty margins are to be expected. The LNCS series will be published
in a smaller than A4 cut, and hence the margins will be rectified by the
publisher.

Authors should consult Springer's authors'
guidelines (ftp://ftp.springernature.com/cs-proceeding/svproc/guidelines/Springer_Guidelines_for_Authors_of_Proceedings.pdf) and use their proceedings
templates, either for
[LaTeX](ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip) or for
[Word](ftp://ftp.springernature.com/cs-proceeding/llncs/word/splnproc1703.zip),
for the preparation of their papers. Springer encourages authors to include
their [ORCIDs](https://goo.gl/hbsa4D) in their papers. In addition, the
corresponding author of each paper, acting on behalf of all of the authors of
that paper, must complete and sign a Consent-to-Publish form. The
corresponding author signing the copyright form should match the corresponding
author marked on the paper. Once the files have been sent to Springer, changes
relating to the authorship of the papers cannot be made.


List of Topics
--------------

- Game theory and mechanism design for security and privacy
- Decision making and decision theory for cybersecurity and security requirements engineering
- Security and privacy for the Internet-of-Things, cyber-physical systems, resilient control systems
- Pricing and economic incentives for building dependable and secure systems
- Risk assessment and security risk management
- Security investment and cyber insurance
- New approaches for security and privacy in cloud computing and for critical infrastructure
- Security and privacy of wireless and mobile communications, including user location privacy
- Dynamic control, learning, and optimization and approximation
- Socio-technological and behavioral approaches to security
- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy
- Behavioral science, decision making, heuristics, and biases
- Modeling and analysis of deception for security within a game-theoretic framework
- Adversarial or strategic machine learning and the role of AI in system security Learning in games for security (new topic this year)
- Game-theoretic or decision-theoretic analysis for the control of epidemics/virus propagation (new topic this year)
- Decision and game theory for blockchain security (new topic this year)

Committees
----------

### Organizing committee

- General Chair: Fei Fang (Carnegie Mellon University)
- TPC Chairs: Haifeng Xu (University of Virginia), Yezekael Hayel (University of Avignon)
- Publicity Co-chair: Tiffany Bao (Arizona State University)
- Web Chair: Chun Kai Ling (Carnegie Mellon University)

Publication
-----------

GameSec22 proceedings will be published in [Springer Lecture Notes of Computer
Science](https://link.springer.com/conference/gamesec)

Contact
-------

All questions about submissions should be emailed to Haifeng Xu
(hx4ad@virginia.edu) or Yezekael Hayel (yezekael.hayel@univ-avignon.fr)

Related Resources

IJGTT 2024   International Journal of Game Theory and Technology
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CGDEIJ 2024   Computer Game Development and Education: An International Journal
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science