Sustainability of bitcoin and blockchains H Vranken Current opinion in environmental sustainability 28, 1-9, 2017 | 711 | 2017 |
X-masking during logic BIST and its impact on defect coverage Y Tang, HJ Wunderlich, H Vranken, F Hapke, M Wittke, P Engelke, ... 2004 International Conferce on Test, 442-451, 2004 | 134 | 2004 |
TriMedia CPU64 architecture JTJ van Eijndhoven, FW Sijstermans, KA Vissers, EJD Pol, MIA Tromp, ... Proceedings 1999 IEEE International Conference on Computer Design: VLSI in …, 1999 | 130 | 1999 |
Application of deterministic logic BIST on industrial circuits G Kiefer, H Vranken, E Jan Marinissen, HJ Wunderlich Journal of Electronic Testing 17, 351-362, 2001 | 129 | 2001 |
Enhanced reduced pin-count test for full-scan design H Vranken, T Waayers, H Fleury, D Lelouvier Journal of Electronic Testing 18, 129-143, 2002 | 95 | 2002 |
Implausible projections overestimate near-term Bitcoin CO2 emissions E Masanet, A Shehabi, N Lei, H Vranken, J Koomey, J Malmodin Nature Climate Change 9 (9), 653-654, 2019 | 79 | 2019 |
Efficient pattern mapping for deterministic logic BIST V Gherman, HJ Wunderlich, H Vranken, F Hapke, M Wittke, M Garbers 2004 International Conferce on Test, 48-56, 2004 | 79 | 2004 |
Discovering software vulnerabilities using data-flow analysis and machine learning J Kronjee, A Hommersom, H Vranken Proceedings of the 13th international conference on availability …, 2018 | 72 | 2018 |
A survey of authentication and communications security in online banking S Kiljan, K Simoens, DD Cock, MV Eekelen, H Vranken ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016 | 64 | 2016 |
Experiences with a synchronous virtual classroom in distance education H Koppelman, H Vranken ACM SIGCSE Bulletin 40 (3), 194-198, 2008 | 61 | 2008 |
Evaluation of transaction authentication methods for online banking S Kiljan, H Vranken, M van Eekelen Future Generation Computer Systems 80, 430-447, 2018 | 54 | 2018 |
Design for testability in hardware software systems HP Vranken, MF Witteman, RC Van Wuijtswinkel IEEE Design & Test of Computers 13 (3), 79-86, 1996 | 44 | 1996 |
ATPG padding and ATE vector repeat per port for reducing test data volume H Vranken, F Hapke, S Rogge, D Chindamo, E Volkerink ITC 3, 1069, 2003 | 43 | 2003 |
Applying deep learning on packet flows for botnet detection J van Roosmalen, H Vranken, M van Eekelen Proceedings of the 33rd annual ACM symposium on applied computing, 1629-1636, 2018 | 40 | 2018 |
Denial-of-service attacks on LoRaWAN E Van Es, H Vranken, A Hommersom Proceedings of the 13th International Conference on Availability …, 2018 | 35 | 2018 |
Detection of DGA-generated domain names with TF-IDF H Vranken, H Alizadeh Electronics 11 (3), 414, 2022 | 28 | 2022 |
Deep in the dark: A novel threat detection system using darknet traffic S Kumar, H Vranken, J van Dijk, T Hamalainen 2019 IEEE International conference on big data (big data), 4273-4279, 2019 | 24 | 2019 |
The role of internet service providers in botnet mitigation J Pijpker, H Vranken 2016 European Intelligence and Security Informatics Conference (EISIC), 24-31, 2016 | 24 | 2016 |
Impact of test point insertion on silicon area and timing during layout H Vranken, FS Sapei, HJ Wunderlich Proceedings Design, Automation and Test in Europe Conference and Exhibition …, 2004 | 23 | 2004 |
Redundancy modelling and array yield analysis for repairable embedded memories A Sehgal, A Dubey, EJ Marinissen, C Wouters, H Vranken, K Chakrabarty IEE Proceedings-Computers and Digital Techniques 152 (1), 97-106, 2005 | 21 | 2005 |