Pursuit-evasion games model network security scenarios where an attacker tries to evade detection while a defender tries to catch them. The graph represents network topology. Vertices are computers or routers. The attacker and defender move through the network.
Game theory helps design defense strategies and predict attacker behavior. The cop number of a graph tells you the minimum number of defenders needed to guarantee catching any attacker.