Conference Information
GameSec 2025: Conference on Game Theory and AI for Security
https://www.gamesec-conf.org/index.phpSubmission Date: |
2025-06-13 |
Notification Date: |
2025-07-25 |
Conference Date: |
2025-10-13 |
Location: |
Athens, Greece |
Years: |
16 |
Viewed: 17383 Tracked: 4 Attend: 2
Call For Papers
General Description The 16th Conference on Game Theory and AI for Security (GameSec-25) will take place from October 13-15 2025 in Athens, Greece. With the rapid advancement of artificial intelligence, game theory, and security technologies, the resilience and trustworthiness of modern systems is more critical than ever. The 2025 Conference on Game Theory and AI for Security focuses on leveraging strategic decision-making, adversarial reasoning, and computational intelligence to address security challenges in complex and dynamic environments. The conference invites novel, high-quality theoretical and empirical contributions that apply game theory, AI, and related methodologies to security, privacy, trust, and fairness in emerging systems. The goal is to bring together researchers from academia, industry, and government to explore interdisciplinary connections between game theory, reinforcement learning, adversarial machine learning, mechanism design, risk assessment, behavioral modeling, and cybersecurity. Through rigorous and practically relevant analytical methods, the conference aims to advance the understanding and application of AI-driven strategies for securing critical infrastructures and emerging technologies. Conference Topics Indicative topics, but not exhaustive, are listed below, and the conference welcomes a broad range of contributions exploring the intersection of game theory, AI, and security. Stackelberg and Bayesian games for cybersecurity Mechanism design for secure and resilient systems Multi-agent security games and adversarial interactions Dynamic and repeated games in security applications Coalitional game theory for trust and privacy Evolutionary game theory in cyber defense Game-theoretic models for deception and misinformation detection Auction-based security mechanisms for resource allocation Nash equilibria in adversarial security settings Aggregative Games for security Adversarial machine learning and robust AI models Reinforcement learning for cyber defense strategies AI-driven risk assessment and threat intelligence Secure federated learning and privacy-preserving AI AI for zero-trust architectures and intrusion detection Explainable AI in security decision-making Large language models for cybersecurity applications AI-powered malware and phishing detection Automated penetration testing and ethical hacking using AI Game-theoretic approaches for securing IoT and edge computing Security strategies for autonomous systems and UAVs AI-driven attack detection in smart grids and critical infrastructures Secure network protocols and AI-powered anomaly detection Blockchain and game theory for decentralized security Cyber-physical system resilience through game-theoretic modeling Security strategies for smart cities and intelligent transportation systems AI-enhanced situational awareness in cyber-physical environments Incentive mechanisms for cybersecurity investments Human-in-the-loop security and behavioral game theory Trust and reputation models in decentralized systems AI-powered fraud detection in financial systems Privacy-aware mechanism design and data-sharing incentives Economic impact of cyber threats and attack mitigation strategies Psychological and cognitive biases in security decision-making Red teaming and AI-generated attack simulations Robust AI models against adversarial perturbations AI-powered misinformation and propaganda detection Security challenges in generative AI and large language models Ethical AI and fairness in security decision-making AI for detecting and mitigating deepfake threats Secure AI model training and adversarial robustness testing Reinforcement learning under adversarial conditions Game-theoretic approaches to securing blockchain networks AI for decentralized identity and authentication management Security challenges in multi-agent and swarm intelligence systems Incentive-driven security solutions for distributed systems AI-powered smart contract verification and fraud detection Secure consensus mechanisms in blockchain and distributed ledgers AI-driven security in autonomous transportation Game theory for cloud security and access control AI-enhanced cyber resilience in government and military networks AI for misinformation mitigation in social networks AI and game theory applications in healthcare cybersecurity Security in quantum computing and post-quantum cryptography AI-powered cybersecurity solutions for industrial control systems AI in securing 5G/6G and next-generation communication networks
Last updated by Dou Sun in 2025-05-06
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICETIS | International Conference on Electronic Technology and Information Science | 2025-06-20 | 2025-06-27 |
ICT4AWE | International Conference on Information and Communication Technologies for Ageing Well and e-Health | 2015-12-07 | 2016-04-21 |
ICBDSC | International Conference on Big Data and Smart Computing | 2024-10-10 | 2025-01-10 |
ISMM | International Symposium on Memory Management | 2023-03-03 | 2023-06-18 |
LATINCOM | IEEE Latin-American Conference on Communications | 2024-08-05 | 2024-11-06 |
AISO | International Conference on Artificial Intelligence and Soft Computing | 2022-10-08 | 2022-10-22 |
ICMDM | International Conference on Mechanical and Digital Manufacturing | 2020-05-10 | 2020-06-27 |
WASA | International Conference on Wireless Algorithms, Systems, and Applications | 2025-02-15 | 2025-06-24 |
ICRCC | International Conference on Radar, Communication and Computing | 2016-09-15 | 2016-08-13 |
GUT | International Conference in Green and Ubiquitous Technology | 2012-06-01 | 2012-07-07 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
b | IEEE Transactions on VLSI Systems | 2.800 | IEEE | 1063-8210 |
Virtual Reality | 4.400 | Springer | 1359-4338 | |
International Journal on Advanced Science, Engineering and Information Technology | INSIGHT | 2088-5334 | ||
International Journal of Advanced Smart Sensor Network Systems | AIRCC | 2231-5225 | ||
Combinatorial Chemistry & High Throughput Screening | Bentham | 1386-2073 | ||
Games and Culture | 2.400 | SAGE | 1555-4120 | |
Journal of Informetrics | 3.400 | Elsevier | 1751-1577 | |
Social Media + Society | 5.500 | SAGE | 2056-3051 | |
Computer Science - Research and Development | Springer | 1865-2034 | ||
a | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2.700 | IEEE | 0278-0070 |
Full Name | Impact Factor | Publisher |
---|---|---|
IEEE Transactions on VLSI Systems | 2.800 | IEEE |
Virtual Reality | 4.400 | Springer |
International Journal on Advanced Science, Engineering and Information Technology | INSIGHT | |
International Journal of Advanced Smart Sensor Network Systems | AIRCC | |
Combinatorial Chemistry & High Throughput Screening | Bentham | |
Games and Culture | 2.400 | SAGE |
Journal of Informetrics | 3.400 | Elsevier |
Social Media + Society | 5.500 | SAGE |
Computer Science - Research and Development | Springer | |
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2.700 | IEEE |
Recommendation