ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

BECIS 2015 - Workshop Behavioral, Economic and Computational Intelligence for Security

Date2015-06-25 - 2015-06-27

Deadline2015-04-27

VenueBuenos Aires, Argentina Argentina

Keywords

Websitehttps://www.ntu.edu.sg/home/boan/events/...

Topics/Call fo Papers

There is a large and growing interest in applying models and techniques at the intersection of artificial intelligence, game theory, operations research, machine learning, social science and psychology to solve problems related to security, which is one of the grand challenges for engineering in the 21st century. In fact, the last five years have seen systems developed and applied to real-world domains including but not limited to randomized patrol planning for the Los Angeles International Airport police, Federal Air Marshal Service, US Coast Guard and Los Angeles Metro System.
While there has been significant progress, there still exist many major challenges facing the design of effective approaches to deal with the difficulties in adversarial domains including physical security and cyber security. These challenges include designing efficient algorithms for adversarial reasoning, improving the robustness of solutions, creating better models of human decisions under bounded rationality, and learning from available data to improve solution quality and adaptation to new conditions. Addressing these challenges requires collaboration from different communities including artificial intelligence, game theory, operations research, social science, and psychology. This workshop is structured to encourage a lively exchange of ideas between members from these communities as well as researchers from industry and the public sector.
Topics
Topics of interest include but are not limited to:
Security games
Security applications of AI methods
Network security and cyber warfare
Game theory foundations
Algorithms for scaling to very large games
Behavioral game theory
Protection against environmental crime
Agent/human interaction for preference elicitation and optimization
Risk analysis and modelling
Machine learning for security
Economic analysis of security
Evaluation/lessons learned of deployed systems

Last modified: 2015-01-24 14:44:17