From: A security method of hardware Trojan detection using path tracking algorithm
Edge
Path Number
1
1→5
2
2→3
4
3→5
5
3→6