Login / Signup

A practical application of game theory to optimize selection of hardware Trojan detection strategies.

Jonathan GrafWhitney BatchelorScott J. HarperRyan MarlowEdward Carlisle IVPeter Athanas
Published in: J. Hardw. Syst. Secur. (2020)
Keyphrases