Skip to main content
Leiden University
Scholarly Publications
Home
Submit
About
Select Collection
All collections
Academic speeches
Dissertations
Faculty of Archaeology
Faculty of Governance and Global Affairs
Faculty of Humanities
Faculty of Science
Faculty of Social and Behavioural Sciences
Leiden Journals, Conference Proceedings and Books
Leiden Law School
Leiden University Press
Medicine / Leiden University Medical Centre (LUMC)
Research output UL
Search box
Your Search
Enabled Filters
(-)
= Mentens, N.
Sort Options
Date (year)
Author / Creator
Title
Refine Results
Resource Type
Article / Letter to editor
(8)
+
-
Article in monograph or in proceedings
(7)
+
-
Availability
Open access
(10)
+
-
Metadata Only
(5)
+
-
Creation Date
2021
(8)
+
-
2022
(4)
+
-
2020
(2)
+
-
Faculty
Faculty of Science
(15)
+
-
Collection
Faculty of Science: Other
(10)
+
-
Leiden Institute of Advanced Computer Science (LIACS)
(5)
+
-
Author
Mentens, N.
(15)
+
-
Vliegen, J.
(5)
+
-
Sateesan, A.
(4)
+
-
Winderickx, J.
(3)
+
-
Braeken, A.
(2)
+
-
Goedemé, T.
(2)
+
-
Le Jeune, L.
(2)
+
-
Show more
Language
en
(15)
+
-
Search results
(1 - 15 of 15)
show grid
show list
save search
A survey of recent developments in testability, safety and security of RISC-V processors
Introduction to the special section on FPL 2020
Low-rate Overuse Flow Tracer (LOFT)
Machine learning for misuse-based network intrusion detection
Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications
In-depth energy analysis of security algorithms and protocols for the Internet of Things
Novel non-cryptographic hash functions for networking and security applications on FPGA
Towards real-time deep learning-based network intrusion detection on FPGA
Enhanced end-to-end security through symmetric-key cryptography in wearable medical sensor networks
Speed records in network flow measurement on FPGA
AITIA: embedded AI techniques for industrial applications
Trusted configuration in cloud FPGAs
Communication and security trade-offs for battery-powered devices
PROOFS 2018 Editorial
Side-channel countermeasures utilizing dynamic logic reconfiguration