共 50 条
- [21] Trust Games: How Game Theory Can Guide the Development of Hardware Trojan Detection Methods PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 91 - 96
- [23] Game Theory for Network Security IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 472 - 486
- [24] Game Theory and Information Security ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
- [25] SHarPen: SoC Security Verification by Hardware Penetration Test 2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 579 - 584
- [26] Security Verification of Hardware-enabled Attestation Protocols 2012 IEEE/ACM 45TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE WORKSHOPS, 2012, : 47 - 54
- [27] Hardware Security at the Limit: Nuclear Verification and Arms Control PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 40 - 40
- [28] Using Game Theory to Address New Security Risks in the IoT EAI/Springer Innovations in Communication and Computing, 2020, : 21 - 42
- [29] Increasing the Confidence in Security Assurance Cases using Game Theory 19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
- [30] Fault Tolerance and Security in Forwarding Packets Using Game Theory MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 534 - 537