The 35 full papers and 3 short papers included in the proceedings were carefully reviewed and selected from 51 submissions. They were organized in topical sections as follows:
Part I: Game-theoretic foundations and learning; game-theoretic cybersecurity frameworks; deception and adversarial defense; AI and LLMs in security;
Part II: Strategic defense and robustness; applicatiouns in security and networks; emerging threats and anomaly detection.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.








