“…The tutorial will be organized to connect different classes of games with different sets of security problems. For example (1) Stackelberg and multi-layer games for proactive defense [8, 26, 68, 70-72, 76, 80, 82], (2) network games for cyber-physical security that deals with critical infrastructure protection and information assurance [3,15,21,36,54,[56][57][58][59][60], (3) dynamic games for adaptive defense for network security [9,16,17,24,66,67,78,79,81], (4) mechanism design theory for economics of network security that investigates resource allocation methodologies [2,5,11,13,61,64,[73][74][75], and (5) game-theoretic analysis of cryptographic concepts, such as perfectly confidentiality and authentication (in classical and quantum networks) [47][48][49][50], network design and -provisioning [30-32, 45, 46, 53] and quantitative security risk management [33-35, 38-44, 51, 52] From the perspective of cybersecurity, the topics of this tutorial will cover recent applications of game theory to several emerging topics such as cross-layer cyber-physical security [6,21,29,59,69,77], cyber deception…”