GameSec 2015
6th Conference on Decision and Game Theory for Security, London, UK,
November 4 - 5, 2015. (Submissions due 1 June 2015)

Nations, corporations, and individuals constantly need to reason about how
to protect their sensitive assets in order to ensure economic growth and
prosperity. Decision making for security and privacy of infrastructure and
information needs a scientific framework that can handle challenges
arising from modern-day heterogeneous, dynamic, and large-scale systems.

GameSec solicits theoretical and practical contributions towards a science
of decision making in security. In particular, GameSec publishes papers
that apply decision and game theory, as well as related techniques such as
dynamic control and mechanism design, to build resilient, secure, and
dependable networked systems.

The goal of GameSec is to bring together academic and indus- trial
researchers in an effort to identify and discuss the major technical
challenges and recent results that highlight the connection between game
theory, control, distributed optimization, economic incentives and real
world security, reputation, trust and privacy problems in a variety of
technological systems. Submissions should solely be original research
papers that have neither been published nor submitted for publication

* Game theory and mechanism design for security and privacy
* Pricing and economic incentives for building dependable and secure
* Dynamic control, learning, and optimization and approximation techniques
* Decision making and decision theory for cybersecurity and security
  requirements engineering
* Socio-technological and behavioral approaches to security
* Risk assessment and risk management
* Security investment and cyber insurance
* Security and privacy for the Internet-of-Things (IoT), cyber-physical
  systems, resilient control systems
* New approaches for security and privacy in cloud computing and for
  critical infrastructure
* Security and privacy of wireless and mobile communications, including
  user location privacy
* Game theory for intrusion detection
* Empirical and experimental studies with game-theoretic or optimization
  analysis for security and privacy

For more information, please see