“…The light research from Scopus with a search string "cybersecurity_X", where X is from the set {game theory, probability, Bayesian} shows {228, 41, 99} the sources respectively. The other sources contain applied approaches from Combinatorial mathematics, probabilities, and statistic [58], graphs theory [59], neural networks [60,61], fuzzy logic and fuzzy sets [62,63], and group theory in cryptography [64 -66].…”