5GAME-THEORETIC COMPUTING IN CYBER-RISK

5.1 HISTORICAL PERSPECTIVE TO GAME THEORY’S ORIGINS

According to Shubik, the disciplines most heavily involved in the utilization of game theory have been management science and operations research, psychology, education, political science, sociology, engineering, computer science, economics, and the military [1]. The usage of game-theoretic risk computing is steadily increasing in the world of cyber-risk informatics. It is a critical topic because security and privacy, as well as availability and usability, determine the trustworthiness of cybersystems and cyber information.

The origins of game theory, which is the mathematical study of conflict situations as a science of rational conflict, are well known [2]. It was, for all intents and purposes, reborn in 1944 as an established field with the publication of a pioneering book, Theory ...

Get Cyber-Risk Informatics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.