Login / Signup

Using computational game theory to guide verification and security in hardware designs.

Andrew M. SmithJackson R. MayoVivian KammlerRobert C. ArmstrongYevgeniy Vorobeychik
Published in: HOST (2017)
Keyphrases