Skip to main content

Table 7 Influence of deleting edge 3 and 6

From: A security method of hardware Trojan detection using path tracking algorithm

Edge

 

Path Number

1

1→5

1

2

2→3

2

4

3→5

2

5

3→6

2