Influence diagrams in cyber security: Conceptualization and potential applications

Sabarathinam Chockalingam, Clara Maathuis

Research output: Chapter in Book/Report/Conference proceedingConference Article in proceedingAcademicpeer-review


Over the last years, cyber-Attacks are increasing in organizations especially due to the use of emerging technologies and transformation in terms of how we work. Informed decision-making in cyber security is critical to prevent, detect, respond, and recover from cyber-Attacks effectively and efficiently. In cyber security, Decision Support System (DSS) plays a crucial role especially in supporting security analysts, managers, and operators in making informed decisions. Artificial Intelligence (AI)-based techniques like Bayesian Networks, Decision Trees are used as an underlying approach in such DSSs. Furthermore, Influence Diagrams (IDs) possess the capability to support informed decision-making based on its existing applications in other domains like medical. However, the complete capability and potential of IDs are not utilised in cyber security especially in terms of its explainable nature for different stakeholders and existing applications in other domains. Therefore, this research tackles the following research question: "What are potential applications of Influence Diagrams (IDs) in cyber security-". We identified applications of IDs in different domains and then translated it to design potential applications for cyber security issues. In the future, this will help both researchers and practitioners to develop and implement IDs for cyber security-related problems, which in turn will enhance decision-making especially due to its explainable nature for different stakeholders.

Original languageEnglish
Title of host publicationProceedings of the 22nd European Conference on Cyber Warfare and Security
EditorsAntonios Andreatos, Christos Douligeris
Publisher Academic Conferences International Limited
Number of pages8
ISBN (Electronic)9781914587702
ISBN (Print)978-1-914587-69-6
Publication statusPublished - 19 Jun 2023
Event22nd European Conference on Cyber Warfare and Security - Athens, Greece
Duration: 22 Jun 202323 Jun 2023
Conference number: 22


Conference22nd European Conference on Cyber Warfare and Security
Abbreviated titleECCWS 2023


  • Cyber security
  • Decision making
  • Graphical model.
  • Incident response
  • Influence diagrams


Dive into the research topics of 'Influence diagrams in cyber security: Conceptualization and potential applications'. Together they form a unique fingerprint.

Cite this