Using computational game theory to guide verification and security in hardware designs | IEEE Conference Publication | IEEE Xplore