Recent cyber and supply chain attacks on the Swiss federal administration and various Swiss companies have shown that cyber security is becoming increasingly important in daily life.
In cybersecurity, Game Theory can be used to begin understanding what a potential attacker may be attempting to do based on the payoffs for their actions. This better understanding can help to improve the decision-making of an organization when it comes to IT Security problems.
In addition, many logs are generated in computer networks. For example, every network packet that passes through a firewall is logged. This large number of log files is suitable for analysis using big data approaches and machine learning. By using machine learning, patterns in the network data can be found that may indicate attacks
The students….