Skip to main content

Table 8 Influence of deleting input 6

From: A security method of hardware Trojan detection using path tracking algorithm

Input Gate
1 1
2 3
3 1, 2
7 4