Conference Information
GameSec 2026: Conference on Game Theory and AI for Security
Please Login to view website of conference
Submission Date: |
2026-06-12 |
Notification Date: |
2026-07-31 |
Conference Date: |
2026-10-26 |
Location: |
Ann Arbor, Michigan, USA |
Years: |
17 |
Viewed: 26782 Tracked: 4 Attend: 2
Call For Papers
Conference Topics
Indicative topics, but not exhaustive, are listed below, and the conference welcomes a broad range of contributions exploring the intersection of game theory, AI, and security.
Stackelberg and Bayesian games for cybersecurity
Mechanism design for secure and resilient systems
Multi-agent security games and adversarial interactions
Dynamic and repeated games in security applications
Coalitional game theory for trust and privacy
Evolutionary game theory in cyber defense
Game-theoretic models for deception and misinformation detection
Auction-based security mechanisms for resource allocation
Nash equilibria in adversarial security settings
Aggregative Games for security
Adversarial machine learning and robust AI models
Reinforcement learning for cyber defense strategies
AI-driven risk assessment and threat intelligence
Secure federated learning and privacy-preserving AI
AI for zero-trust architectures and intrusion detection
Explainable AI in security decision-making
Large language models for cybersecurity applications
AI-powered malware and phishing detection
Automated penetration testing and ethical hacking using AI
Game-theoretic approaches for securing IoT and edge computing
Security strategies for autonomous systems and UAVs
AI-driven attack detection in smart grids and critical infrastructures
Secure network protocols and AI-powered anomaly detection
Blockchain and game theory for decentralized security
Cyber-physical system resilience through game-theoretic modeling
Security strategies for smart cities and intelligent transportation systems
AI-enhanced situational awareness in cyber-physical environments
Incentive mechanisms for cybersecurity investments
Human-in-the-loop security and behavioral game theory
Trust and reputation models in decentralized systems
AI-powered fraud detection in financial systems
Privacy-aware mechanism design and data-sharing incentives
Economic impact of cyber threats and attack mitigation strategies
Psychological and cognitive biases in security decision-making
Red teaming and AI-generated attack simulations
Robust AI models against adversarial perturbations
AI-powered misinformation and propaganda detection
Security challenges in generative AI and large language models
Ethical AI and fairness in security decision-making
AI for detecting and mitigating deepfake threats
Secure AI model training and adversarial robustness testing
Reinforcement learning under adversarial conditions
Game-theoretic approaches to securing blockchain networks
AI for decentralized identity and authentication management
Security challenges in multi-agent and swarm intelligence systems
Incentive-driven security solutions for distributed systems
AI-powered smart contract verification and fraud detection
Secure consensus mechanisms in blockchain and distributed ledgers
AI-driven security in autonomous transportation
Game theory for cloud security and access control
AI-enhanced cyber resilience in government and military networks
AI for misinformation mitigation in social networks
AI and game theory applications in healthcare cybersecurity
Security in quantum computing and post-quantum cryptography
AI-powered cybersecurity solutions for industrial control systems
AI in securing 5G/6G and next-generation communication networks
Indicative topics, but not exhaustive, are listed below, and the conference welcomes a broad range of contributions exploring the intersection of game theory, AI, and security.
Stackelberg and Bayesian games for cybersecurity
Mechanism design for secure and resilient systems
Multi-agent security games and adversarial interactions
Dynamic and repeated games in security applications
Coalitional game theory for trust and privacy
Evolutionary game theory in cyber defense
Game-theoretic models for deception and misinformation detection
Auction-based security mechanisms for resource allocation
Nash equilibria in adversarial security settings
Aggregative Games for security
Adversarial machine learning and robust AI models
Reinforcement learning for cyber defense strategies
AI-driven risk assessment and threat intelligence
Secure federated learning and privacy-preserving AI
AI for zero-trust architectures and intrusion detection
Explainable AI in security decision-making
Large language models for cybersecurity applications
AI-powered malware and phishing detection
Automated penetration testing and ethical hacking using AI
Game-theoretic approaches for securing IoT and edge computing
Security strategies for autonomous systems and UAVs
AI-driven attack detection in smart grids and critical infrastructures
Secure network protocols and AI-powered anomaly detection
Blockchain and game theory for decentralized security
Cyber-physical system resilience through game-theoretic modeling
Security strategies for smart cities and intelligent transportation systems
AI-enhanced situational awareness in cyber-physical environments
Incentive mechanisms for cybersecurity investments
Human-in-the-loop security and behavioral game theory
Trust and reputation models in decentralized systems
AI-powered fraud detection in financial systems
Privacy-aware mechanism design and data-sharing incentives
Economic impact of cyber threats and attack mitigation strategies
Psychological and cognitive biases in security decision-making
Red teaming and AI-generated attack simulations
Robust AI models against adversarial perturbations
AI-powered misinformation and propaganda detection
Security challenges in generative AI and large language models
Ethical AI and fairness in security decision-making
AI for detecting and mitigating deepfake threats
Secure AI model training and adversarial robustness testing
Reinforcement learning under adversarial conditions
Game-theoretic approaches to securing blockchain networks
AI for decentralized identity and authentication management
Security challenges in multi-agent and swarm intelligence systems
Incentive-driven security solutions for distributed systems
AI-powered smart contract verification and fraud detection
Secure consensus mechanisms in blockchain and distributed ledgers
AI-driven security in autonomous transportation
Game theory for cloud security and access control
AI-enhanced cyber resilience in government and military networks
AI for misinformation mitigation in social networks
AI and game theory applications in healthcare cybersecurity
Security in quantum computing and post-quantum cryptography
AI-powered cybersecurity solutions for industrial control systems
AI in securing 5G/6G and next-generation communication networks
Last updated by Dou Sun in 2026-03-11
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2026-04-10 | 2026-06-01 | 2026-08-26 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| b | b | a2 | PKC | International Conference on Practice and Theory in Public Key Cryptography | 2025-10-24 | 2026-02-13 | 2026-05-25 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b3 | ICCTA | International Conference on Computer Theory and Applications | 2023-09-15 | 2023-11-10 | 2023-12-16 | ||
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| c | HotSec | USENIX Workshop on Hot Topics in Security | 2020-06-04 | 2020-06-15 | 2020-08-11 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Journal of Control Theory and Applications | 1.5 | Springer | 1672-6340 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Journal of Combinatorial Theory, Series B | 1.200 | Elsevier | 0095-8956 | |
| Journal of Combinatorial Theory, Series A | 0.900 | Elsevier | 0097-3165 |