Skip to main content

Table 7 Influence of deleting edge 3 and 6

From: A security method of hardware Trojan detection using path tracking algorithm

Edge   Path Number
1 1→5 1
2 2→3 2
4 3→5 2
5 3→6 2