Construction of knowledge graph of hardware Trojan detection method | IEEE Conference Publication | IEEE Xplore