Exploiting reconfigurable hardware for network security | IEEE Conference Publication | IEEE Xplore