Skip to main content

Table 3 Number of edge traversals

From: A security method of hardware Trojan detection using path tracking algorithm

Edge

 

Path Number

1

1→5

1

2

2→3

2

3

2→4

1

4

3→5

2

5

3→6

2

6

4→6

2