Game Models for Cyber-Physical Infrastructures, 2nd Edition

A special issue of Games (ISSN 2073-4336). This special issue belongs to the section "Algorithmic and Computational Game Theory".

Deadline for manuscript submissions: closed (29 February 2024) | Viewed by 738

Special Issue Editors


E-Mail Website
Guest Editor
1. LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, 4020 Linz, Austria
2. Institute for Artificial Intelligence and Cybersecurity, Universität Klagenfurt, 9020 Klagenfurt, Austria
Interests: decision theory and game theory with applications in cybersecurity; applied cryptology; security economics; security of artificial intelligence; risk management; information theoretical security; complexity theory; data science for security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Center for Digital Safety & Security, Austrian Institute of Technology (AIT), 1210 Vienna, Austria
Interests: decision theory and game theory with applications in cybersecurity; risk management and security management; analysis of cascading effects and their simulation

E-Mail Website
Guest Editor
Center for Digital Safety & Security, Austrian Institute of Technology (AIT), 1210 Vienna, Austria
Interests: risk management; risk assessment; critical infrastructure protection; threat propagation; game theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Critical infrastructures (CIs) provide a multitude of vital services to communities. The protection of CIs has become more important than ever, and the protection of supply chains and complex networks of mutually dependent actors calls for an equally diverse and multidimensional variety of models and mechanisms. These models for crisis management and resilience range from new methods of threat modeling and -intelligence, serious games for disaster preparation, to gamification for self-enforcing security and resilience. These models often use artificial intelligence-assisted security and mechanisms to protect the AI itself, bug-bounty programs, formal methods, resilient distributed ledger systems, and cryptography (e.g., cryptocurrencies) amongst others.

This special issue invites contributions from the intersection of game theory and cybersecurity, improving existing or proposing new approaches to establish a systemic view and protection of CIs against large-scale attackers. The work can comprise, but is not limited to, systematic identification of vulnerabilities and risks, control theory for the protection against cascading effects of damage events, heterogeneous game models to cover complex attack patterns like advanced persistent threats, models of bounded rationality to describe human error and protections against this, real-life case studies and lessons learned. In addition, we welcome work on the adversarial use of AI, trustworthy AI and strategic online learning, as well as multi-criteria strategic decision-making and mechanism design for security and useable security.

Dr. Stefan Rass
Dr. Sandra König
Dr. Stefan Schauer
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Games is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security of critical infrastructures
  • game theoretic treatment of advanced persistent threats
  • game-theoretic analysis of IoT/CPS security
  • game theory for privacy
  • cyber-security risk assessment using game and decision theory
  • risk management based on game and decision theory
  • empirical and behavioral game theory
  • model validation and verification
  • simulation of security games
  • models of bounded rationality in decision making
  • organizational behaviors and incentives
  • information sharing and cooperation
  • mechanism design of security and privacy
  • dynamic games for cyber security
  • adversary behavior and ecosystem
  • security and resilience of critical infrastructures
  • numerical methods for solving security games

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop