<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Aptos;
        panose-1:2 11 0 4 2 2 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        font-size:11.0pt;
        font-family:"Aptos",sans-serif;
        mso-ligatures:standardcontextual;
        mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#467886;
        text-decoration:underline;}
span.apple-converted-space
        {mso-style-name:apple-converted-space;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:11.0pt;
        mso-ligatures:none;
        mso-fareast-language:EN-US;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style>
</head>
<body lang="EN-GB" link="#467886" vlink="#96607D" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><span style="color:black">Hello,<br>
<br>
On Monday, the MSP101 talk will be given by<span class="apple-converted-space">&nbsp;</span>Aven Dauz<span class="apple-converted-space">&nbsp;</span>(MSP). See the details of the talk below.<o:p></o:p></span></p>
<p class="MsoNormal" style="caret-color: rgb(0, 0, 0);font-variant-caps: normal;orphans: auto;text-align:start;widows: auto;-webkit-text-stroke-width: 0px;word-spacing:0px">
<span style="color:black"><br>
Best,<br>
Dilsat<br>
<br>
**********************************************************************<br>
<br>
Date:&nbsp;Monday, 7 April at 15:00<br>
<br>
Room:&nbsp;LT412, Livingstone Tower<br>
<br>
Zoom link:&nbsp;<a href="https://strath.zoom.us/j/85449272187?pwd=0qNkQqybiaKgBpbEBRv38x11x4db5n.1" target="_blank" title="https://strath.zoom.us/j/85449272187?pwd=0qNkQqybiaKgBpbEBRv38x11x4db5n.1"><span style="color:#96607D">https://strath.zoom.us/j/85449272187?pwd=0qNkQqybiaKgBpbEBRv38x11x4db5n.1</span></a><o:p></o:p></span></p>
<p class="MsoNormal" style="caret-color: rgb(0, 0, 0);font-variant-caps: normal;orphans: auto;text-align:start;widows: auto;-webkit-text-stroke-width: 0px;word-spacing:0px">
<span style="color:black">Live stream on Youtube:<span class="apple-converted-space">&nbsp;</span><a href="https://www.youtube.com/@msp101strathclyde4" title="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.youtube.com%2F%40msp101strathclyde4&amp;data=05%7C02%7Cdilsat.yuksel%40strath.ac.uk%7Cc21ac4f8f5674221bc6908dd57280a4d%7C631e0763153347eba5cd0457bee5944e%7C0%7C0%7C638762551657891362%7CUnkn"><span style="color:#96607D">https://www.youtube.com/@msp101strathclyde4</span></a><br>
<br>
Speaker:<span class="apple-converted-space">&nbsp;</span>Aven Dauz<br>
<br>
Title:<span class="apple-converted-space">&nbsp;</span></span>Modelling cybersecurity games with compositional game theory<span style="color:black"><o:p></o:p></span></p>
<p class="MsoNormal" style="caret-color: rgb(0, 0, 0);font-variant-caps: normal;orphans: auto;text-align:start;widows: auto;-webkit-text-stroke-width: 0px;word-spacing:0px">
<span style="color:black">&nbsp;<o:p></o:p></span></p>
<p class="MsoNormal" style="caret-color: rgb(0, 0, 0);font-variant-caps: normal;orphans: auto;text-align:start;widows: auto;-webkit-text-stroke-width: 0px;word-spacing:0px">
<span style="color:black">Abstract:<span class="apple-converted-space">&nbsp;</span></span>Compositional game theory and its corresponding Haskell DSL open-games-engine, have been used for modelling microeconomic games, auctions, and smart contracts. Some advantages
 of this compositional approach are leveraging modularity and code-reuse to construct larger games. Incidentally, game theory has been used to model complex attack-defense scenarios in cybersecurity, with the simplest case modelling the strategic interaction
 between a single attacker and defender. Scaling these models to accurately reflect real-world attacks and extrapolate data to improve the performance of systems remains an active area of research. In this talk I'll present a honeypot allocation game and design
 choices that allow a modeller to easily extend the construction to represent defensive strategies such as deception.</p>
<p class="MsoNormal"><span style="color:black"><br>
**********************************************************************<o:p></o:p></span></p>
<p class="MsoNormal" style="caret-color: rgb(0, 0, 0);font-variant-caps: normal;orphans: auto;text-align:start;widows: auto;-webkit-text-stroke-width: 0px;word-spacing:0px">
<span style="color:black">&nbsp;<o:p></o:p></span></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>