Preliminaries: Static and Dynamic Games, Normal form and Extensive Form Games, Zero-sum and Non-zero-sum games, Bayesian Games, Stackelberg Games, Perfect vs Imperfect Information, Complete vs Incomplete Information, Stochastic Games.Intrusion Detection Games: Cyber Warfare Games, Games for Denial of Service and Distributed Denial of Service (DDoS), Flooding, Malware, Ransomware. Games for Protecting Critical Infrastructure.Wireless Security Games: Physical and MAC layer security games, Secure Routing Games, Games for Secure Ad hoc, Sensor and Vehicular Networks.Economics of Cybersecurity: Games for Resource Allocation and Incentive compatibility, Games for Risk Assessment and Mitigation, Economic models and metrics for Cybersecurity.Blockchain Games: Game theoretic models for Consensus algorithms, Games for Double Spending Attacks and Selfish Mining, Cheating Games,Games for DDoS attacks.Privacy Games: Games for Identity and Location Privacy, Local vs Global Eavesdroppers, Trust Games, Trust vs Privacy
Programs
View all programsFrom the news
- Anti-Ragging Awareness Program 2025
- Wadi Project Achieves Milestone: Nearly 3,000 Saplings Planted in a Single Day
Others
- Amrita Hosts One-Day Workshop on Career Opportunities in Pharmaceuticals and Release of the 9th Edition of the Alumni Magazine
- Postdoctoral Fellowship in Deregulated Power Market, Smart Grid, Cyber Security, Electric Vehicles (Charging/Discharging/Infrastructure), Special Machine Designs, Novel DC-DC/AC-DC/DC-AC Converters, Micro Grid Applications @Coimbatore