Hello,
we cordially invite you to submit an extended version of your past work
to the upcoming Special Issue "Game Models for Cyber-Physical
Infrastructures II" of the MDPI Games Journal, guest-edited by Stefan
Rass (Johannes Kepler University Linz) and Sandra König (Austrian
Institute of Technology), and Stefan Schauer (Austrian Institute of
Technology). See
https://www.mdpi.com/journal/games/special_issues/K1RCO6S300
for further details.
The publication is open access, and the article processing charges
(APCs) of 1400 CHF (Swiss Francs) per published paper are fully funded
by institutions through the Knowledge Unlatched initiative, resulting in
no direct charge to authors even if the author is not affiliated with
the funding institutions now. For more information on Knowledge
Unlatched and other APC free journals, please see:
http://www.knowledgeunlatched.org.
******************************
Deadline: 29 February 2024
******************************
Abstract of the Special Issue Call
**********************************
This special issue invites contributions from the intersection of game
theory and cybersecurity, improving existing or proposing new approaches
to establish a systemic view and protection of CIs against large-scale
attackers. The work can comprise, but is not limited to, systematic
identification of vulnerabilities and risks, control theory for the
protection against cascading effects of damage events, heterogeneous
game models to cover complex attack patterns like advanced persistent
threats, models of bounded rationality to describe human error and
protections against this, real-life case studies and lessons learned. In
addition, we welcome work on the adversarial use of AI, trustworthy AI
and strategic online learning, as well as multi-criteria strategic
decision-making and mechanism design for security and useable security.
Keywords
* security of critical infrastructures
* game theoretic treatment of advanced persistent threats
* game-theoretic analysis of IoT/CPS security
* game theory for privacy
* cyber-security risk assessment using game and decision theory
* risk management based on game and decision theory
* empirical and behavioral game theory
* model validation and verification
* simulation of security games
* models of bounded rationality in decision making
* organizational behaviors and incentives
* information sharing and cooperation
* mechanism design of security and privacy
* dynamic games for cyber security
* adversary behavior and ecosystem
* security and resilience of critical infrastructures
* numerical methods for solving security games
We look forward to a submission of yours!
Best wishes,
Stefan Rass, Sandra König, Stefan Schauer
--
Univ.-Prof. Priv.-Doz. Dr. Stefan Rass
Chair of Secure Systems
LIT Secure and Correct Systems Lab
JOHANNES KEPLER UNIVERSITÄT LINZ
Altenberger Strasse 69
Open Innovation Center
4040 Linz, Österreich
T +43 732 2468 9545
stefan.rass@jku.at
www.jku.at/secsys
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************