Fig. 14From: A security method of hardware Trojan detection using path tracking algorithmIntersection of all the paths and the edges. This figure presents the information for the node connections and sought pathsBack to article page