International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 1 (January-February 2026) Submit your research before last 3 days of February to publish your research paper in the issue of January-February.

Application of Theory of Constraints & Game Theory in Cybersecurity

Author(s) Mr. Vijayakumar Radhakrishnan
Country India
Abstract This paper presents an integrated framework combining the Theory of Constraints (TOC) and Game Theory to enhance cybersecurity defences. TOC is applied to systematically identify and mitigate critical bottlenecks within security infrastructure, while Game Theory models the strategic interactions between attackers and defenders. We propose algorithms for constraint identification and optimal resource allocation based on Nash Equilibrium solutions. Simulation demonstrates improved system resilience and efficient resource utilisation.
Keywords Cybersecurity, Theory of Constraints, Game Theory, Resource Allocation, Nash Equilibrium, Bottleneck, Defence Strategy
Field Computer > Network / Security
Published In Volume 7, Issue 4, July-August 2025
Published On 2025-08-28
DOI https://doi.org/10.36948/ijfmr.2025.v07i04.54666

Share this