﻿<?xml version="1.0" encoding="UTF-8"?>
<b:Sources SelectedStyle="" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography"  xmlns="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" >
<b:Source>
<b:Tag>ho.ea:explainable:2026</b:Tag>
<b:SourceType>Proceedings</b:SourceType>
<b:Year>2026</b:Year>
<b:Month>March</b:Month>
<b:Author>
<b:Author><b:NameList>
<b:Person><b:Last>Ho</b:Last><b:First>S</b:First><b:Middle>Destyny</b:Middle></b:Person>
<b:Person><b:Last>Zhang</b:Last><b:First>Yunxiao</b:First></b:Person>
<b:Person><b:Last>Brucker</b:Last><b:First>Achim</b:First><b:Middle>D</b:Middle></b:Person>
</b:NameList></b:Author>
</b:Author>
<b:Title>Explainable Security Investment: A Shapley Value Inspired Metric</b:Title>
<b:Comments>Many existing methods can effectively find the optimal cybersecurity investment, but communicating these findings to non-technical stakeholders is a well-known cybersecurity challenge [27]. This work aims to provide additional metrics that grant further insight and justifications for an implemented cybersecurity portfolio. The Shapley value is a classic concept in cooperative game theory that quantifies the fair contribution of each player to a collective outcome. In security games, it offers a natural way to measure the contribution of individual security controls to overall defence. However, the Harsanyi dividend of combining two coalitions when taking their respective security reductions as their portfolio contribution tends to negative attributions in undesirable situations. This undermines interpretability. In this work, we propose a novel measure tailored for security games which guarantees non-negative Harsanyi dividends when combining coalitions that result in the significant increase of security. The method is grounded in the composition of two key factors that capture each controls marginal impact. These factors offer an interpretable and fair decomposition of the overall security effectiveness. Beyond interpretability, we demonstrate how these attributions can support decision-making in cyber defence planning. To address computational scalability, we present an approximation algorithm that significantly reduces runtimes with little impact on explainability.14th EAI International Conference on Game Theory for Networks, GameNets 2025 ; Conference date: 17-03-2025 Through 18-03-2025</b:Comments>
</b:Source>
</b:Sources>
