{"id":"https://openalex.org/W4417221445","doi":"https://doi.org/10.3389/fcomp.2025.1703586","title":"Can LLMs effectively provide game-theoretic-based scenarios for cybersecurity?","display_name":"Can LLMs effectively provide game-theoretic-based scenarios for cybersecurity?","publication_year":2025,"publication_date":"2025-12-11","ids":{"openalex":"https://openalex.org/W4417221445","doi":"https://doi.org/10.3389/fcomp.2025.1703586"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2025.1703586","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1703586","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1703586/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1703586/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037164344","display_name":"Daniele Proverbio","orcid":"https://orcid.org/0000-0002-0122-479X"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Daniele Proverbio","raw_affiliation_strings":["Department of Industrial Engineering, University of Trento, Trento, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering, University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120092207","display_name":"Alessio Buscemi","orcid":"https://orcid.org/0009-0003-4668-9915"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"nonprofit","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Alessio Buscemi","raw_affiliation_strings":["Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052537136","display_name":"Alessandro Di Stefano","orcid":"https://orcid.org/0000-0003-4905-3309"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alessandro Di Stefano","raw_affiliation_strings":["School Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, United Kingdom","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012915897","display_name":"The Anh Han","orcid":"https://orcid.org/0000-0002-3095-7714"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"The Anh Han","raw_affiliation_strings":["School Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, United Kingdom","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004262628","display_name":"German Castignani","orcid":"https://orcid.org/0000-0001-5594-4904"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"nonprofit","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"German Castignani","raw_affiliation_strings":["Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056748708","display_name":"P\u00edetro Li\u00f3","orcid":"https://orcid.org/0000-0002-0540-5053"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pietro Li\u00f2","raw_affiliation_strings":["Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037164344"],"corresponding_institution_ids":["https://openalex.org/I193223587"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1991432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.12770000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.12770000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0966000035405159,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.08129999786615372,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.59579998254776},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4124999940395355},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.39079999923706055},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.361299991607666},{"id":"https://openalex.org/keywords/personality","display_name":"Personality","score":0.3041999936103821},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.2808000147342682}],"concepts":[{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.59579998254776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46700000762939453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4268999993801117},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4124999940395355},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4036000072956085},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.361299991607666},{"id":"https://openalex.org/C187288502","wikidata":"https://www.wikidata.org/wiki/Q641118","display_name":"Personality","level":2,"score":0.3041999936103821},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.27649998664855957},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.26980000734329224},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.2630999982357025},{"id":"https://openalex.org/C20249471","wikidata":"https://www.wikidata.org/wiki/Q2298789","display_name":"Evolutionary game theory","level":3,"score":0.2612999975681305},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C138954614","wikidata":"https://www.wikidata.org/wiki/Q9192","display_name":"Mandarin Chinese","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3389/fcomp.2025.1703586","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1703586","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1703586/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire/e101bfe8-ac35-4b2e-a416-57557c5eee3c","is_oa":true,"landing_page_url":"https://research.tees.ac.uk/en/publications/e101bfe8-ac35-4b2e-a416-57557c5eee3c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proverbio, D, Buscemi, A, Di Stefano, A, Han, T A, Castignani, G & Li\u00f2, P 2025, 'Can LLMs effectively provide game-theoretic-based scenarios for cybersecurity?', Frontiers in Computer Science, vol. 7, 1703586. https://doi.org/10.3389/fcomp.2025.1703586","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:05969a2ce971427bb4e2b9d6d1d2846b","is_oa":true,"landing_page_url":"https://doaj.org/article/05969a2ce971427bb4e2b9d6d1d2846b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 7 (2025)","raw_type":"article"},{"id":"pmh:oai:iris.unitn.it:11572/473572","is_oa":true,"landing_page_url":"https://hdl.handle.net/11572/473572","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2025.1703586","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1703586","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1703586/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1248029367","display_name":"Integrated Structural and Probabilistic Approaches for Biological and Epidemiological Systems","funder_award_id":"101076926","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4237802725","display_name":"Evolutionary Game Theory Under Uncertainty","funder_award_id":"EP/Y00857X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417221445.pdf","grobid_xml":"https://content.openalex.org/works/W4417221445.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W233187448","https://openalex.org/W1963993304","https://openalex.org/W1974964983","https://openalex.org/W2010310612","https://openalex.org/W2010631303","https://openalex.org/W2016162995","https://openalex.org/W2062973696","https://openalex.org/W2070586534","https://openalex.org/W2085948958","https://openalex.org/W2097427281","https://openalex.org/W2117940871","https://openalex.org/W2147179411","https://openalex.org/W2185325989","https://openalex.org/W2250513429","https://openalex.org/W2612172766","https://openalex.org/W2889196900","https://openalex.org/W2907907364","https://openalex.org/W2966828561","https://openalex.org/W2989070634","https://openalex.org/W3024755729","https://openalex.org/W3043795202","https://openalex.org/W3095882817","https://openalex.org/W4313120321","https://openalex.org/W4315488681","https://openalex.org/W4383815588","https://openalex.org/W4390531888","https://openalex.org/W4393160233","https://openalex.org/W4399338566","https://openalex.org/W4401461713","https://openalex.org/W4401584475","https://openalex.org/W4402892453","https://openalex.org/W4403511027","https://openalex.org/W4403904079","https://openalex.org/W4405755429","https://openalex.org/W4406928793","https://openalex.org/W4407128123","https://openalex.org/W4407163436","https://openalex.org/W4407729347","https://openalex.org/W4408899059","https://openalex.org/W4410251374","https://openalex.org/W4412438655","https://openalex.org/W4415798246"],"related_works":[],"abstract_inverted_index":{"Introduction":[0],"Game":[1],"theory":[2],"has":[3],"long":[4],"served":[5],"as":[6,135,174],"a":[7,63],"foundational":[8],"tool":[9],"in":[10,166,181],"cybersecurity":[11,167],"to":[12,88,95,115,153,189,203],"test,":[13],"predict,":[14],"and":[15,21,34,59,78,104,112,169,194,211,225],"design":[16],"strategic":[17],"interactions":[18],"between":[19],"attackers":[20],"defenders.":[22],"The":[23],"recent":[24],"advent":[25],"of":[26,39,56,140,149,156,164,197,220],"Large":[27],"Language":[28],"Models":[29],"(LLMs)":[30],"offers":[31],"new":[32],"tools":[33],"challenges":[35],"for":[36,66,171,228],"the":[37,54,79,126,150,154,191,218,221],"security":[38],"computer":[40],"systems.":[41],"In":[42,201],"this":[43],"work,":[44],"we":[45,70,83,123],"investigate":[46,71],"whether":[47,85],"classical":[48],"game-theoretic":[49,67],"frameworks":[50],"can":[51,215],"effectively":[52],"capture":[53],"behaviors":[55,206],"LLM-driven":[57],"actors":[58],"bots.":[60],"Methods":[61],"Using":[62],"reproducible":[64],"framework":[65],"LLM":[68,198],"agents,":[69],"two":[72],"canonical":[73],"scenarios\u2014the":[74],"one-shot":[75],"zero-sum":[76],"game":[77],"dynamic":[80],"Prisoner's":[81],"Dilemma\u2014and":[82],"test":[84],"LLMs":[86,103,165,175,224],"converge":[87],"expected":[89],"outcomes":[90],"or":[91,138],"exhibit":[92],"deviations":[93],"due":[94],"embedded":[96],"biases.":[97],"We":[98,143,184],"experiments":[99],"on":[100],"four":[101],"state-of-the-art":[102],"five":[105],"natural":[106],"languages":[107],"(English,":[108],"French,":[109],"Arabic,":[110],"Vietnamese,":[111],"Mandarin":[113],"Chinese)":[114],"assess":[116],"linguistic":[117],"sensitivity.":[118],"Results":[119],"For":[120],"both":[121],"games,":[122],"observe":[124],"that":[125],"final":[127,151],"payoffs":[128,152],"are":[129],"influenced":[130],"by":[131,209],"agents":[132],"characteristics":[133],"such":[134],"personality":[136],"traits":[137],"knowledge":[139],"repeated":[141],"rounds.":[142],"also":[144,185],"uncover":[145],"an":[146],"unexpected":[147,205],"sensitivity":[148],"choice":[155],"languages,":[157],"which":[158],"should":[159],"warn":[160],"against":[161],"indiscriminate":[162],"application":[163],"applications":[168],"call":[170],"in-depth":[172],"studies,":[173],"may":[176],"behave":[177],"differently":[178],"when":[179],"deployed":[180],"different":[182],"countries.":[183],"employ":[186],"quantitative":[187],"metrics":[188],"evaluate":[190],"internal":[192],"consistency":[193],"cross-language":[195],"stability":[196],"agents.":[199],"Discussion":[200],"addition":[202],"uncovering":[204],"requiring":[207],"attention":[208],"scholars":[210],"practitioners,":[212],"our":[213],"work":[214],"help":[216],"guide":[217],"selection":[219],"most":[222],"stable":[223],"optimizing":[226],"models":[227],"secure":[229],"applications.":[230]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-11T00:00:00"}
