About the Project
In the recent literature, game theory has been successfully applied to cyber security in order to model attacker/defender scenarios. The aim of this project is to design, implement and test novel non-corporative game theoretical models based on linear algebra techniques and applying them to a range of cyber security related scenarios such as security assessment, cloud security and vulnerability patching. This will extend previous work including such as [1-5].
The scientific objectives of the project are:
• To devise a game theoretic model for cyber security scenarios between a defender and a cyber attacker;
• To analyse the game by computing its Nash Equilibria, in order to derive an optimal defense strategy;
• To design and implement a prototype tool for evaluating the above framework, implemented in the form of a publicly available tool.
Applicants should have an Honours Degree at 2.1 or above (or equivalent) in Computer Science or related disciplines. In addition, they should have excellent programming skills in Matlab/Java and good working knowledge of mathematics, in particular linear algebra.
Qualified applicants are strongly encouraged to informally contact the supervising academic, Dr Eckhard Pfluegel ([email protected]), to discuss the application.
 Maghrabi, L., Pfluegel, E., & Noorji, S. F. (2016). Designing Utility Functions for Game-Theoretic Cloud Security Assessment : A Case for Using the Common Vulnerability Scoring System. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
 Maghrabi, L., Pfluegel, E., Al-Fagih, L., Graf, R., Settanni, G., & Skopik, F. (2017). Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory. In International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). London: IEEE.
 Mohebbi Moghaddam, M., Manshaei, M. H., & Zhu, Q. (2015). To Trust or Not: A Security Signaling Game Between Service Provider and Client. (M. H. R. Khouzani, E. Panaousis, & G. Theodorakopoulos, Eds.), Decision and Game Theory for Security: 6th International Conference, GameSec 2015. Springer International Publishing.
 Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., & Smeraldi, F. (2014). Cybersecurity Games and Investments: A Decision Support Approach. Lecture Notes in Computer Science, 266–286.
Why not add a message here
Based on your current searches we recommend the following search filters.
Based on your current search criteria we thought you might be interested in these.
Design, development and implementation of an in-orbit laboratory based on reconfigurable hardware, on board of a small satellite, for the test and characterization of complex digital circuits