Workshop Schedule

8:30 – 9:30 Introduction to game theory and applications in security (Tamer Bașar)

9:30 –10:00  Coffee Break

10:00 – 11:30 Game-theoretic methods for secure data communication (Tamer Bașar and Quanyan Zhu)

11:30 – 1:00 Lunch Break

1:00 – 2:00 Network Defense and Security (Radha Poovendran)

2:00 – 3:00 Game-theoretic methods for network security: Analysis for node capturing and cloning attacks (Linda Bushnell)

3:00 – 3:30 Coffee Break

3:30 – 4:30 Game-theoretic methods for secure and resilient control (Quanyan Zhu)