There is no funding for this project: applications can only be accepted from self-funded candidates
 Maghrabi, L., & Pfluegel, E. (2015). Moving assets to the cloud: A game theoretic approach based on trust. Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on, 1–5.
 Maghrabi, L., Pfluegel, E., & Noorji, S. F. (2016). Designing Utility Functions for Game-Theoretic Cloud Security Assessment : A Case for Using the Common Vulnerability Scoring System. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
 Maghrabi, L., Pfluegel, E., Al-Fagih, L., Graf, R., Settanni, G., & Skopik, F. (2017). Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
 Mohebbi Moghaddam, M., Manshaei, M. H., & Zhu, Q. (2015). To Trust or Not: A Security Signaling Game Between Service Provider and Client. (M. H. R. Khouzani, E. Panaousis, & G. Theodorakopoulos, Eds.), Decision and Game Theory for Security: 6th International Conference, GameSec 2015. Springer International Publishing.
 Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., & Smeraldi, F. (2014). Cybersecurity Games and Investments: A Decision Support Approach. Lecture Notes in Computer Science, 266–286.
FTE Category A staff submitted: 10.20
Research output data provided by the Research Excellence Framework (REF)Click here to see the results for all UK universities