tdsc 2011 - IEEE Transactions on Dependable and Secure Computing Special Issue on "Learning, Games and Security"
Date2011-03-31
Deadline2010-11-15
VenueCall for P, UK - United Kingdom
Keywords
Websitehttps://tinyurl.com/tdsc-lgs
Topics/Call fo Papers
IEEE Transactions on Dependable and Secure Computing
Special Issue on "Learning, Games and Security"
Manuscript submission deadline: 15th of November 2010
http://tinyurl.com/tdsc-lgs
***Overview****
Information and network security is an important application area for
machine learning and game theory. We invite contributions from
theorists
and practictioners in learning and games, with an interest in
security.
Security applications are a point where machine learning and game
theory
naturally meet. This is especially true in contexts where some
learning
from data occurs, where the source of the data may be adversarial, or
where decision making involves interactions between multiple agents.
For
example, wireless lightweight communication devices are now
ubiquitous,
making security an important concern. Principled approaches to
tackling
the problem are necessary. These are frequently interdisciplinary,
using
elements from machine learning or game theory. Machine learning and
game
theory are also linked at a deeper level. For example, fundamental
game
theoretic results can be derived from a learning theory perspective.
In
addition, game theory naturally arises in learning and decision making
problems involving multiple agents. This issue is concerned with
machine
learning and game theoretic topics related to security applications,
such as networking, or other multidisciplinary work in cryptography,
game theory, machine learning, security and statistics. We invite both
papers addressing theoretical problems, as well as papers addressing
practical issues. Topics include (but are not limited to):
- Adversarial classification, learning and hypothesis testing.
- Biometric authentication.
- Captchas and other authentication topics.
- Cryptographic applications of machine learning.
- Distributed inference and decision making (with some relevance to
security).
- Fraud detection.
- Intrusion detection and response.
- Malware detection.
- Multi-agent systems and mechanism design (with some relevance to
security).
- Privacy-preserving machine learning.
- Spam detection.
In general, we invite submissions addressing information security and
privacy problems related to learning and games. This includes
principled
approaches to solving security problems that employ learning or game
theory. We are particularly interested in contributions on the theory
of
learning and games, which have a direct connection to security
problems.
****Submission Guidelines****
Papers submitted to this special issue for possible publication must
be
original and must not be under consideration for publication in any
other journal or conference. TDSC requires meaningful technical
novelty
in submissions that extend previously published conference papers.
Extension beyond the conference version(s) is not simply a matter of
length. Thus, expanded motivation, expanded discussion of related
work,
variants of previously reported algorithms, incremental additional
experiments/simulations, may provide additional length but will fall
below the line for proceeding with review.
Important Dates
- Manuscript submission deadline: 15th of November 2010
- Reviews due: 12th of January 2011
- Revised papers due: 16th of February 2011
- Final Decision: 15th of March 2011
- Camera-ready papers due: 31st of March 2011
- Tentative Publication date: Summer/Fall issue, 2011
Guest Editors
Dr. Christos Dimitrakakis
Frankfurt Institute for Advanced Studies,
Goethe University, Germany
Dr. Tom Karygiannis
National Institute of Standards & Technology (NIST), USA
Dr. Katerina Mitrokotsa
School of Computer & Communication Sciences,
Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Special Issue on "Learning, Games and Security"
Manuscript submission deadline: 15th of November 2010
http://tinyurl.com/tdsc-lgs
***Overview****
Information and network security is an important application area for
machine learning and game theory. We invite contributions from
theorists
and practictioners in learning and games, with an interest in
security.
Security applications are a point where machine learning and game
theory
naturally meet. This is especially true in contexts where some
learning
from data occurs, where the source of the data may be adversarial, or
where decision making involves interactions between multiple agents.
For
example, wireless lightweight communication devices are now
ubiquitous,
making security an important concern. Principled approaches to
tackling
the problem are necessary. These are frequently interdisciplinary,
using
elements from machine learning or game theory. Machine learning and
game
theory are also linked at a deeper level. For example, fundamental
game
theoretic results can be derived from a learning theory perspective.
In
addition, game theory naturally arises in learning and decision making
problems involving multiple agents. This issue is concerned with
machine
learning and game theoretic topics related to security applications,
such as networking, or other multidisciplinary work in cryptography,
game theory, machine learning, security and statistics. We invite both
papers addressing theoretical problems, as well as papers addressing
practical issues. Topics include (but are not limited to):
- Adversarial classification, learning and hypothesis testing.
- Biometric authentication.
- Captchas and other authentication topics.
- Cryptographic applications of machine learning.
- Distributed inference and decision making (with some relevance to
security).
- Fraud detection.
- Intrusion detection and response.
- Malware detection.
- Multi-agent systems and mechanism design (with some relevance to
security).
- Privacy-preserving machine learning.
- Spam detection.
In general, we invite submissions addressing information security and
privacy problems related to learning and games. This includes
principled
approaches to solving security problems that employ learning or game
theory. We are particularly interested in contributions on the theory
of
learning and games, which have a direct connection to security
problems.
****Submission Guidelines****
Papers submitted to this special issue for possible publication must
be
original and must not be under consideration for publication in any
other journal or conference. TDSC requires meaningful technical
novelty
in submissions that extend previously published conference papers.
Extension beyond the conference version(s) is not simply a matter of
length. Thus, expanded motivation, expanded discussion of related
work,
variants of previously reported algorithms, incremental additional
experiments/simulations, may provide additional length but will fall
below the line for proceeding with review.
Important Dates
- Manuscript submission deadline: 15th of November 2010
- Reviews due: 12th of January 2011
- Revised papers due: 16th of February 2011
- Final Decision: 15th of March 2011
- Camera-ready papers due: 31st of March 2011
- Tentative Publication date: Summer/Fall issue, 2011
Guest Editors
Dr. Christos Dimitrakakis
Frankfurt Institute for Advanced Studies,
Goethe University, Germany
Dr. Tom Karygiannis
National Institute of Standards & Technology (NIST), USA
Dr. Katerina Mitrokotsa
School of Computer & Communication Sciences,
Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Other CFPs
- The International Conference on Informatics Engineering & Information Science (ICIEIS2011)
- The International Conference on Electronic Technologies and Digital Computing (ETDC2011)
- ACM TiiS special issue on Affective Interaction in Natural Environments
- ACM TiiS: Special Issue on Eye Gaze in Intelligent Human-Machine Interaction
- ACM TiiS special issue on Personalization and Persuasion
Last modified: 2010-09-13 14:02:23