Return to Article Details Triggering detection technique of the hardware trojans in the combinational logic systems Download Download PDF