Skip to main content

Table 3 Number of edge traversals

From: A security method of hardware Trojan detection using path tracking algorithm

Edge   Path Number
1 1→5 1
2 2→3 2
3 2→4 1
4 3→5 2
5 3→6 2
6 4→6 2