Fig. 23
From: A security method of hardware Trojan detection using path tracking algorithm
![Fig. 23](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2Fs13638-022-02165-9/MediaObjects/13638_2022_2165_Fig23_HTML.png)
Comparison of the number of multiplexers required among benchmarks for the net coverage. By using a combination of the path tracking and multiplexer match algorithms, comparison of the number of multiplexers required for the net coverage is illustrated in this Figure