Exploiting sub-graph isomorphism and probabilistic neural networks for the detection of hardware Trojans at RTL | IEEE Conference Publication | IEEE Xplore