Abstract: The increasing need for real-time, interpretable network intrusion detection at the edge drives the demand for novel lightweight hardware implementations suited for resource-constrained ...