Workshop on Game theory and Machine learning for Cyber-security (Work-GMC) focuses on all technical and practical aspects of information assurance & communications security for networks, using Game theory and Machine learning. The goal of this Workshop is to bring together researchers and practitioners from academia, professional and industry to focus, identify and discuss key challenges and recent results that highlight the interdisciplinary connections between game theory, machine learning, control, distributed optimization, adversarial reasoning, mechanism design, behavioral analysis, risk assessments, security, reputation, trust, and privacy issues; in order to understand the modern security threats and countermeasures, and establishing new collaborations in these areas.

Work-GMC welcomes contributions that exploit decision theory and game theory to address security and related issues such as privacy, trust, or bias in emerging systems.

Doctoral Sessions

Sessions will be dedicated to the evaluation and monitoring of doctoral students’ work, in the form of communications or posters, to present the state of progress, the approaches used and any current results of their research on original questions related to Mathematics and Computer Science. Supervision and synthesis plenary conferences, centered around questions of methodology and research, computational and data sciences and their analysis, are planned.

  • Topics of interest

Authors could submit short articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:

  •   – Applications of game theory in security, encompassing both cooperative and non-cooperative games
  •   – Applications of machine learning in security and Strategic utilization of machine learning for cybersecurity
  •   – Audit and Audit Reduction & Authentication and Authorization, Access Control, Anonymity
  •   – Applied Cryptography, Cryptanalysis, Digital Signatures
  •   – Biometric Security
  •   – Boundary Control Devices
  •   – Certification and Accreditation
  •   – Cross-Layer Design for Security
  •   – Data and System Integrity, Database Security
  •   – Deception and signaling techniques in security
  •   – Defensive Information Warfare
  •   – Denial of Service Protection, Intrusion Detection, Anti-Malware
  •   – Distributed Systems Security
  •   – Electronic Commerce & E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
  •   – Exploration of adversarial and trustworthy machine learning techniques including in foundation models
  •   – Grid Security
  •   – Implementation of multi-agent learning approaches in security contexts
  •   – Implementation and implications of cyber insurance policies within security strategies
  •   – Information Hiding and Watermarking & Information Survivability
  •   – Incorporating insights from behavioral sciences into decision-making within security contexts
  •   – Integration of behavioral aspects into security and privacy frameworks
  •   – Integration of reinforcement learning techniques into cybersecurity measures
  •   – Insider Threat Protection, Integrity
  •   – Intellectual Property Protection
  •   – Internet/Intranet Security and use of foundation models in security
  •   – Key Management and Key Recovery
  •   – Language-based Security
  •   – Mobile and Wireless Security
  •   – Mobile, Ad Hoc and Sensor Network Security
  •   – Monitoring and Surveillance
  •   – Multimedia Security, Operating System Security, Peer-to-Peer Security
  •   – Performance Evaluations of Protocols & Security Application
  •   – Privacy and Data Protection
  •   – Product Evaluation Criteria and Compliance
  •   – Risk Evaluation and Security Certification
  •   – Risk/Vulnerability Assessment
  •   – Security & Network Management
  •   – Security Threats Like DDoS, MiM (Man in the Middle), Session Hijacking, Replay Attack, etc. and Countermeasures
  •   – Techniques for risk assessment and effective risk management
  •   – Trusted Computing
  •   – Ubiquitous Computing Security
  •   – Utilization of control theory principles for autonomous defense
  •   – Virtualization Security, VoIP Security, Web 2.0 Security2

Important dates

  • Submission deadline: March 20, 2026
  • Authors notification: March 30, 2026
  • Registration & camera – Ready Paper Due: April 5, 2026
  • For more information (contact us):

Here’s where you can reach us:

            work-gmc@googlegroups.com

Submission:

Poster template: The form requires you to upload your poster. The poster template can be downloaded and modified. Download the template here: https://docs.google.com/presentation/d/1ofUxLDud92PjOjxuqMYs6gHnL5vc-ABC/edit?usp=sharing&ouid=115433581541899417456&rtpof=true&sd=true

Submit your communication here     https://forms.gle/E14CXpHUmqhwL3B76 

  • Registration (mandatory for all participants)

Students: 5 000 F.CFA (7.5 euros), Academics : 10 000 F.CFA (15 euros), Companies : 30 000 F.CFA (45 euros).
Included: Book of abstracts, Documents, Supplies, Coffee breaks . . .


Payment can be made by transferring funds to one of the following mobile numbers:
677 69 10 96
(Benoit Martin Azanguezet Kimatio)
697 62 20 21


NB: Please send a Whatsapp message with a copy of your deposit confirmation (to number 677 69 10 96).