1. flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE, p. 638-642 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  2. Vulnerability Detection on Mobile Applications Using State Machine Inference

    van der Lee, W. & Verwer, S., 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2018. Los Alamitos, CA: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Using a satisfiability solver to identify deterministic finite state automata

    Heule, MJH. & Verwer, SE., 2009, BNAIC 2009 Benelux Conference on Artificial Intelligence. Calders, T., Tuyls, K. & Pechenizkiy, M. (eds.). Eindhoven: BNAIC, p. 91-98 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Timed automata for behavorial pattern recognition

    Verwer, SE., de Weerdt, MM. & Witteveen, C., 2005, BNAIC 2005 - Proceedings of the seventeenth Belgium-Netherlands conference on artificial intelligence. Verbeeck, K., Tuyls, K., Nowé, A., Manderick, B. & Kuijpers, B. (eds.). Brussels, Belgium: KVAB, p. 291-296 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. The efficiency of identifying timed automata and the power of clocks

    Verwer, SE., de Weerdt, MM. & Witteveen, C., 2011, In : Information and Computation. 209, 3, p. 606-625 20 p.

    Research output: Contribution to journalArticleScientificpeer-review

  6. TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems

    Lin, Q., Adepu, S., Verwer, S. & Mathur, A., 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 525-536 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. Solving bin-packing problems under privacy preservation: Possibilities and trade-offs

    Hoogervorst, R., Zhang, Y., Tillem, G., Erkin, Z. & Verwer, S., 2019, In : Information Sciences. 500, p. 203-216 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Reliable Machine Learning for Networking: Key Issues and Approaches

    Hammerschmidt, C. A., Garcia, S., Verwer, S. & State, R., 2017, 2017 IEEE 42nd conference on Local Computer Networks, LCN 2017. IEEE, p. 167-170 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  9. Regular inference as vertex coloring

    Florêncio, CC. & Verwer, SE., 2014, In : Theoretical Computer Science. 558, p. 18-34 17 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. Proceedings of the 13th International Conference on Grammatical Inference ICGI: JMLR Workshop and Conference Proceedings

    Verwer, S. (ed.), van Zaanen, M. (ed.) & Smetsers, R. (ed.), 2016, JMLR. 169 p. (JMLR: Workshop and Conference Proceedings)

    Research output: Book/ReportBook editingScientificpeer-review

Previous 1 2 3 4 5 Next

ID: 172770