Skip to main content

Table 8 Influence of deleting input 6

From: A security method of hardware Trojan detection using path tracking algorithm

Input

Gate

1

1

2

3

3

1, 2

7

4