8:30 – 9:30 Introduction to game theory and applications in security (Tamer Bașar)
9:30 –10:00 Coffee Break
10:00 – 11:30 Game-theoretic methods for secure data communication (Tamer Bașar and Quanyan Zhu)
11:30 – 1:00 Lunch Break
1:00 – 2:00 Network Defense and Security (Radha Poovendran)
2:00 – 3:00 Game-theoretic methods for network security: Analysis for node capturing and cloning attacks (Linda Bushnell)
3:00 – 3:30 Coffee Break
3:30 – 4:30 Game-theoretic methods for secure and resilient control (Quanyan Zhu)