关注
Harald Vranken
Harald Vranken
Open Universiteit & Radboud Universiteit
在 ou.nl 的电子邮件经过验证
标题
引用次数
引用次数
年份
Sustainability of bitcoin and blockchains
H Vranken
Current opinion in environmental sustainability 28, 1-9, 2017
7112017
X-masking during logic BIST and its impact on defect coverage
Y Tang, HJ Wunderlich, H Vranken, F Hapke, M Wittke, P Engelke, ...
2004 International Conferce on Test, 442-451, 2004
1342004
TriMedia CPU64 architecture
JTJ van Eijndhoven, FW Sijstermans, KA Vissers, EJD Pol, MIA Tromp, ...
Proceedings 1999 IEEE International Conference on Computer Design: VLSI in …, 1999
1301999
Application of deterministic logic BIST on industrial circuits
G Kiefer, H Vranken, E Jan Marinissen, HJ Wunderlich
Journal of Electronic Testing 17, 351-362, 2001
1292001
Enhanced reduced pin-count test for full-scan design
H Vranken, T Waayers, H Fleury, D Lelouvier
Journal of Electronic Testing 18, 129-143, 2002
952002
Implausible projections overestimate near-term Bitcoin CO2 emissions
E Masanet, A Shehabi, N Lei, H Vranken, J Koomey, J Malmodin
Nature Climate Change 9 (9), 653-654, 2019
792019
Efficient pattern mapping for deterministic logic BIST
V Gherman, HJ Wunderlich, H Vranken, F Hapke, M Wittke, M Garbers
2004 International Conferce on Test, 48-56, 2004
792004
Discovering software vulnerabilities using data-flow analysis and machine learning
J Kronjee, A Hommersom, H Vranken
Proceedings of the 13th international conference on availability …, 2018
722018
A survey of authentication and communications security in online banking
S Kiljan, K Simoens, DD Cock, MV Eekelen, H Vranken
ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016
642016
Experiences with a synchronous virtual classroom in distance education
H Koppelman, H Vranken
ACM SIGCSE Bulletin 40 (3), 194-198, 2008
612008
Evaluation of transaction authentication methods for online banking
S Kiljan, H Vranken, M van Eekelen
Future Generation Computer Systems 80, 430-447, 2018
542018
Design for testability in hardware software systems
HP Vranken, MF Witteman, RC Van Wuijtswinkel
IEEE Design & Test of Computers 13 (3), 79-86, 1996
441996
ATPG padding and ATE vector repeat per port for reducing test data volume
H Vranken, F Hapke, S Rogge, D Chindamo, E Volkerink
ITC 3, 1069, 2003
432003
Applying deep learning on packet flows for botnet detection
J van Roosmalen, H Vranken, M van Eekelen
Proceedings of the 33rd annual ACM symposium on applied computing, 1629-1636, 2018
402018
Denial-of-service attacks on LoRaWAN
E Van Es, H Vranken, A Hommersom
Proceedings of the 13th International Conference on Availability …, 2018
352018
Detection of DGA-generated domain names with TF-IDF
H Vranken, H Alizadeh
Electronics 11 (3), 414, 2022
282022
Deep in the dark: A novel threat detection system using darknet traffic
S Kumar, H Vranken, J van Dijk, T Hamalainen
2019 IEEE International conference on big data (big data), 4273-4279, 2019
242019
The role of internet service providers in botnet mitigation
J Pijpker, H Vranken
2016 European Intelligence and Security Informatics Conference (EISIC), 24-31, 2016
242016
Impact of test point insertion on silicon area and timing during layout
H Vranken, FS Sapei, HJ Wunderlich
Proceedings Design, Automation and Test in Europe Conference and Exhibition …, 2004
232004
Redundancy modelling and array yield analysis for repairable embedded memories
A Sehgal, A Dubey, EJ Marinissen, C Wouters, H Vranken, K Chakrabarty
IEE Proceedings-Computers and Digital Techniques 152 (1), 97-106, 2005
212005
系统目前无法执行此操作,请稍后再试。
文章 1–20