Game Theory and Risk Analysis

A special issue of Games (ISSN 2073-4336). This special issue belongs to the section "Applied Game Theory".

Deadline for manuscript submissions: 28 February 2025 | Viewed by 1751

Special Issue Editor


E-Mail Website
Guest Editor
Faculty of Science and Technology, University of Stavanger, 4036 Stavanger, Norway
Interests: game theory; operations research; risk analysis; political economy; homeland security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

For this Special Issue, we expect high-quality original research papers that provide theoretical and/or practical applications within Games’ aims and scope. In addition to strong game theoretic content, the focus on risk analysis encompasses, for example, security, safety, cyber risk, financial risk, reliability, digital currencies, cryptocurrencies and terrorism. Submitted papers will be peer reviewed in the same manner as any other submission to Games, using the online submission system.

Prof. Dr. Kjell Hausken
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Games is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • game theory
  • risk analysis
  • security
  • safety
  • cyber risk
  • financial risk
  • reliability
  • digital currencies
  • cryptocurrencies
  • terrorism

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

27 pages, 363 KiB  
Review
A Review of Attacker–Defender Games and Cyber Security
by Kjell Hausken, Jonathan W. Welburn and Jun Zhuang
Games 2024, 15(4), 28; https://doi.org/10.3390/g15040028 - 14 Aug 2024
Viewed by 723
Abstract
The focus of this review is the long and broad history of attacker–defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have [...] Read more.
The focus of this review is the long and broad history of attacker–defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have received attention and to indicate future research directions. The methodology uses the search terms game theory, attack, defense, and cyber security in Web of Science, augmented with the authors’ knowledge of the field. Games may involve multiple attackers and defenders over multiple periods. Defense involves security screening and inspection, the detection of invaders, jamming, secrecy, and deception. Incomplete information is reviewed due to its inevitable presence in cyber security. The findings pertain to players sharing information weighted against the security investment, influenced by social planning. Attackers stockpile zero-day cyber vulnerabilities. Defenders build deterrent resilient systems. Stochastic cyber security games play a role due to uncertainty and the need to build probabilistic models. Such games can be further developed. Cyber security games based on traffic and transportation are reviewed; they are influenced by the more extensive communication of GPS data. Such games should be extended to comprise air, land, and sea. Finally, cyber security education and board games are reviewed, which play a prominent role. Full article
(This article belongs to the Special Issue Game Theory and Risk Analysis)
Back to TopTop