1. Conference contribution › Scientific › Peer-reviewed
  2. Using datasets from industrial control systems for cyber security research and education

    Lin, Q., Verwer, S., Kooij, R. & Mathur, A., 2020, Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers. Nadjm-Tehrani, S. (ed.). Springer, p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11777 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Vulnerability Detection on Mobile Applications Using State Machine Inference

    van der Lee, W. & Verwer, S., 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2018. Los Alamitos, CA: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE, p. 638-642 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Book editing › Scientific › Peer-reviewed
  6. Proceedings of the 13th International Conference on Grammatical Inference ICGI: JMLR Workshop and Conference Proceedings

    Verwer, S. (ed.), van Zaanen, M. (ed.) & Smetsers, R. (ed.), 2016, JMLR. 169 p. (JMLR: Workshop and Conference Proceedings)

    Research output: Book/ReportBook editingScientificpeer-review

  7. Dissertation (TU Delft) › Scientific
  8. Efficient Identification of Timed Automata: Theory and Practice

    Verwer, SE., 2010, Delft. 252 p.

    Research output: ThesisDissertation (TU Delft)Scientific

Previous 1 2 3 4 5 Next

ID: 172770