{"id":2344,"date":"2022-07-25T12:37:48","date_gmt":"2022-07-25T12:37:48","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=2344"},"modified":"2022-12-18T17:02:40","modified_gmt":"2022-12-18T17:02:40","slug":"automation-of-hardware-security","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/automation-of-hardware-security\/","title":{"rendered":"Automation of Hardware Security"},"content":{"rendered":"<div class=\"mai-grid entries entries-grid has-boxed\" style=\"--entry-title-font-size:var(--font-size-lg);--align-text:start;--entry-meta-text-align:start;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/1;--columns-md:1\/1;--columns-lg:1\/1;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:1;\" aria-label=\"HW2VEC: a Graph Learning Tool for Automating Hardware Security\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/automation-of-hardware-security\/hw2vec-a-graph-learning-tool-for-automating-hardware-security\/\" rel=\"bookmark\">HW2VEC: a Graph Learning Tool for Automating Hardware Security<\/a><\/h3>\n<\/div><\/article><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":3528,"parent":570,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2344"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=2344"}],"version-history":[{"count":8,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2344\/revisions"}],"predecessor-version":[{"id":3721,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2344\/revisions\/3721"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/570"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/3528"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=2344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}