Looking to list your PhD opportunities? Log in here.
About the Project
In the recent literature, game theory has been successfully applied to cyber security in order to model attacker/defender scenarios. The aim of this project is to design, implement and test novel non-corporative game theoretical models based on linear algebra techniques and applying them to a range of cyber security related scenarios such as security assessment, cloud security and vulnerability patching. This will extend previous work including such as [1-5].
The scientific objectives of the project are:
• To devise a game theoretic model for cyber security scenarios between a defender and a cyber attacker;
• To analyse the game by computing its Nash Equilibria, in order to derive an optimal defense strategy;
• To design and implement a prototype tool for evaluating the above framework, implemented in the form of a publicly available tool.
Applicants should have an Honours Degree at 2.1 or above (or equivalent) in Computer Science or related disciplines. In addition, they should have excellent programming skills in Matlab/Java and good working knowledge of mathematics, in particular linear algebra.
Qualified applicants are strongly encouraged to informally contact the supervising academic, Dr Eckhard Pfluegel (E.Pfluegel@kingston.ac.uk), to discuss the application.
Funding Notes
References
[2] Maghrabi, L., Pfluegel, E., & Noorji, S. F. (2016). Designing Utility Functions for Game-Theoretic Cloud Security Assessment : A Case for Using the Common Vulnerability Scoring System. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
[3] Maghrabi, L., Pfluegel, E., Al-Fagih, L., Graf, R., Settanni, G., & Skopik, F. (2017). Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
[4] Mohebbi Moghaddam, M., Manshaei, M. H., & Zhu, Q. (2015). To Trust or Not: A Security Signaling Game Between Service Provider and Client. (M. H. R. Khouzani, E. Panaousis, & G. Theodorakopoulos, Eds.), Decision and Game Theory for Security: 6th International Conference, GameSec 2015. Springer International Publishing.
[5] Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., & Smeraldi, F. (2014). Cybersecurity Games and Investments: A Decision Support Approach. Lecture Notes in Computer Science, 266–286.
Email Now
Why not add a message here
The information you submit to Kingston University will only be used by them or their data partners to deal with your enquiry, according to their privacy notice. For more information on how we use and store your data, please read our privacy statement.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Search suggestions
Based on your current searches we recommend the following search filters.
Check out our other PhDs in London, United Kingdom
Check out our other PhDs in United Kingdom
Start a New search with our database of over 4,000 PhDs

PhD suggestions
Based on your current search criteria we thought you might be interested in these.
Making a Computer-Based Tutorial Environment for Mathematics “Intelligent” : The Design, Implementation and Evaluation of a Tutorial System that Learns
Kingston University
Finding 30 minutes in the marathon: a systematic approach to training design for the non-elite competitive marathon runner
Anglia Ruskin University ARU
Smart Computer Models for Nuclear Reactor Design
University of Sheffield