Conference Information
GameSec 2025: Conference on Game Theory and AI for Security
https://www.gamesec-conf.org/index.phpSubmission Date: |
2025-06-13 |
Notification Date: |
2025-07-25 |
Conference Date: |
2025-10-13 |
Location: |
Athens, Greece |
Years: |
16 |
Viewed: 24351 Tracked: 4 Attend: 2
Call For Papers
General Description
The 16th Conference on Game Theory and AI for Security (GameSec-25) will take place from October 13-15 2025 in Athens, Greece.
With the rapid advancement of artificial intelligence, game theory, and security technologies, the resilience and trustworthiness of modern systems is more critical than ever. The 2025 Conference on Game Theory and AI for Security focuses on leveraging strategic decision-making, adversarial reasoning, and computational intelligence to address security challenges in complex and dynamic environments.
The conference invites novel, high-quality theoretical and empirical contributions that apply game theory, AI, and related methodologies to security, privacy, trust, and fairness in emerging systems. The goal is to bring together researchers from academia, industry, and government to explore interdisciplinary connections between game theory, reinforcement learning, adversarial machine learning, mechanism design, risk assessment, behavioral modeling, and cybersecurity. Through rigorous and practically relevant analytical methods, the conference aims to advance the understanding and application of AI-driven strategies for securing critical infrastructures and emerging technologies.
Conference Topics
Indicative topics, but not exhaustive, are listed below, and the conference welcomes a broad range of contributions exploring the intersection of game theory, AI, and security.
Stackelberg and Bayesian games for cybersecurity
Mechanism design for secure and resilient systems
Multi-agent security games and adversarial interactions
Dynamic and repeated games in security applications
Coalitional game theory for trust and privacy
Evolutionary game theory in cyber defense
Game-theoretic models for deception and misinformation detection
Auction-based security mechanisms for resource allocation
Nash equilibria in adversarial security settings
Aggregative Games for security
Adversarial machine learning and robust AI models
Reinforcement learning for cyber defense strategies
AI-driven risk assessment and threat intelligence
Secure federated learning and privacy-preserving AI
AI for zero-trust architectures and intrusion detection
Explainable AI in security decision-making
Large language models for cybersecurity applications
AI-powered malware and phishing detection
Automated penetration testing and ethical hacking using AI
Game-theoretic approaches for securing IoT and edge computing
Security strategies for autonomous systems and UAVs
AI-driven attack detection in smart grids and critical infrastructures
Secure network protocols and AI-powered anomaly detection
Blockchain and game theory for decentralized security
Cyber-physical system resilience through game-theoretic modeling
Security strategies for smart cities and intelligent transportation systems
AI-enhanced situational awareness in cyber-physical environments
Incentive mechanisms for cybersecurity investments
Human-in-the-loop security and behavioral game theory
Trust and reputation models in decentralized systems
AI-powered fraud detection in financial systems
Privacy-aware mechanism design and data-sharing incentives
Economic impact of cyber threats and attack mitigation strategies
Psychological and cognitive biases in security decision-making
Red teaming and AI-generated attack simulations
Robust AI models against adversarial perturbations
AI-powered misinformation and propaganda detection
Security challenges in generative AI and large language models
Ethical AI and fairness in security decision-making
AI for detecting and mitigating deepfake threats
Secure AI model training and adversarial robustness testing
Reinforcement learning under adversarial conditions
Game-theoretic approaches to securing blockchain networks
AI for decentralized identity and authentication management
Security challenges in multi-agent and swarm intelligence systems
Incentive-driven security solutions for distributed systems
AI-powered smart contract verification and fraud detection
Secure consensus mechanisms in blockchain and distributed ledgers
AI-driven security in autonomous transportation
Game theory for cloud security and access control
AI-enhanced cyber resilience in government and military networks
AI for misinformation mitigation in social networks
AI and game theory applications in healthcare cybersecurity
Security in quantum computing and post-quantum cryptography
AI-powered cybersecurity solutions for industrial control systems
AI in securing 5G/6G and next-generation communication networks
Last updated by Dou Sun in 2025-05-06
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | b | a2 | PKC | International Conference on Practice and Theory in Public Key Cryptography | 2025-10-24 | 2026-02-13 | 2026-05-25 |
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2025-04-04 | 2025-06-01 | 2025-08-26 | |
| c | HotSec | USENIX Workshop on Hot Topics in Security | 2020-06-04 | 2020-06-15 | 2020-08-11 | ||
| b3 | ICCTA | International Conference on Computer Theory and Applications | 2023-09-15 | 2023-11-10 | 2023-12-16 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 | ||
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2025-02-13 | 2025-05-12 | 2025-08-10 |
| Short | Full Name | Conference |
|---|---|---|
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| PKC | International Conference on Practice and Theory in Public Key Cryptography | 2026-05-25 |
| PST | International Conference on Privacy, Security and Trust | 2025-08-26 |
| HotSec | USENIX Workshop on Hot Topics in Security | 2020-08-11 |
| ICCTA | International Conference on Computer Theory and Applications | 2023-12-16 |
| ISC | Information Security Conference | 2025-10-20 |
| IWSEC | International Workshop on Security | 2019-08-28 |
| Security | USENIX Security Symposium | 2026-08-12 |
| NSS | International Conference on Network and System Security | 2023-08-14 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| International Journal of Game Theory and Technology | AIRCC | 2455-0892 | ||
| Network Security | Elsevier | 1353-4858 | ||
| b | Journal of Computer Security | IOS Press | 0926-227X | |
| b | Computers & Security | 4.800 | Elsevier | 0167-4048 |
| ACM Transactions on Privacy and Security | 3.000 | ACM | 2471-2566 | |
| Journal of Internet Security | DDSecure.Net Inc. | 1206-4890 | ||
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| Journal of Combinatorial Theory, Series A | 0.900 | Elsevier | 0097-3165 | |
| Journal of Combinatorial Theory, Series B | 1.200 | Elsevier | 0095-8956 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| International Journal of Game Theory and Technology | AIRCC | |
| Network Security | Elsevier | |
| Journal of Computer Security | IOS Press | |
| Computers & Security | 4.800 | Elsevier |
| ACM Transactions on Privacy and Security | 3.000 | ACM |
| Journal of Internet Security | DDSecure.Net Inc. | |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| Journal of Combinatorial Theory, Series A | 0.900 | Elsevier |
| Journal of Combinatorial Theory, Series B | 1.200 | Elsevier |