default search action
BibTeX records: Ken Keefe
@inproceedings{DBLP:conf/epew/KeefeFRWS18, author = {Ken Keefe and Brett Feddersen and Michael J. Rausch and Ronald Joseph Wright and William H. Sanders}, editor = {Rena Bakhshi and Paolo Ballarini and Beno{\^{\i}}t Barbot and Hind Castel{-}Taleb and Anne Remke}, title = {An Ontology Framework for Generating Discrete-Event Stochastic Models}, booktitle = {Computer Performance Engineering - 15th European Workshop, {EPEW} 2018, Paris, France, October 29-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11178}, pages = {173--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02227-3\_12}, doi = {10.1007/978-3-030-02227-3\_12}, timestamp = {Tue, 07 May 2024 20:13:41 +0200}, biburl = {https://dblp.org/rec/conf/epew/KeefeFRWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/RauschFKS18, author = {Michael J. Rausch and Ahmed M. Fawaz and Ken Keefe and William H. Sanders}, editor = {Annabelle McIver and Andr{\'{a}}s Horv{\'{a}}th}, title = {Modeling Humans: {A} General Agent Model for the Evaluation of Security}, booktitle = {Quantitative Evaluation of Systems - 15th International Conference, {QEST} 2018, Beijing, China, September 4-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11024}, pages = {373--388}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99154-2\_23}, doi = {10.1007/978-3-319-99154-2\_23}, timestamp = {Tue, 03 Mar 2020 12:16:34 +0100}, biburl = {https://dblp.org/rec/conf/qest/RauschFKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChehKFCTS17, author = {Carmen Cheh and Ken Keefe and Brett Feddersen and Binbin Chen and William G. Temple and William H. Sanders}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {Developing Models for Physical Attacks in Cyber-Physical Systems}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {49--55}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140249}, doi = {10.1145/3140241.3140249}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChehKFCTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/RauschKFS17, author = {Michael J. Rausch and Ken Keefe and Brett Feddersen and William H. Sanders}, editor = {Gregorio D'Agostino and Antonio Scala}, title = {Automatically Generating Security Models from System Models to Aid in the Evaluation of {AMI} Deployment Options}, booktitle = {Critical Information Infrastructures Security - 12th International Conference, {CRITIS} 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10707}, pages = {156--167}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-99843-5\_14}, doi = {10.1007/978-3-319-99843-5\_14}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/RauschKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/NoureddineMKBS17, author = {Mohammad A. Noureddine and Andrew Marturano and Ken Keefe and Masooda N. Bashir and William H. Sanders}, editor = {Dong Seong Kim and Masato Kitakami and Vijay Varadharajan}, title = {Accounting for the Human User in Predictive Security Models}, booktitle = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017}, pages = {329--338}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PRDC.2017.58}, doi = {10.1109/PRDC.2017.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/NoureddineMKBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KeefeS16, author = {Ken Keefe and William H. Sanders}, title = {Reliability Analysis with Dynamic Reliability Block Diagrams in the M{\"{o}}bius Modeling Tool}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262723}, doi = {10.4108/EAI.14-12-2015.2262723}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KeefeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/WrightKFS16, author = {Ronald Joseph Wright and Ken Keefe and Brett Feddersen and William H. Sanders}, editor = {Grigore M. Hav{\^{a}}rneanu and Roberto Setola and Hypatia Nassopoulos and Stephen D. Wolthusen}, title = {A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher}, booktitle = {Critical Information Infrastructures Security - 11th International Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10242}, pages = {252--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-71368-7\_21}, doi = {10.1007/978-3-319-71368-7\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/WrightKFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/RauschFKS16, author = {Michael J. Rausch and Brett Feddersen and Ken Keefe and William H. Sanders}, editor = {Gul Agha and Benny Van Houdt}, title = {A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using {ADVISE}}, booktitle = {Quantitative Evaluation of Systems - 13th International Conference, {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9826}, pages = {279--294}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43425-4\_19}, doi = {10.1007/978-3-319-43425-4\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/qest/RauschFKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/NoureddineKSB15, author = {Mohammad A. Noureddine and Ken Keefe and William H. Sanders and Masooda N. Bashir}, editor = {David M. Nicol}, title = {Quantitative security metrics with human in the loop}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {21:1--21:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746215}, doi = {10.1145/2746194.2746215}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/NoureddineKSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/BuchananK14, author = {Craig Buchanan and Ken Keefe}, editor = {Gethin Norman and William H. Sanders}, title = {Simulation Debugging and Visualization in the M{\"{o}}bius Modeling Framework}, booktitle = {Quantitative Evaluation of Systems - 11th International Conference, {QEST} 2014, Florence, Italy, September 8-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8657}, pages = {226--240}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10696-0\_18}, doi = {10.1007/978-3-319-10696-0\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/qest/BuchananK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/FordKLSM13, author = {Michael D. Ford and Ken Keefe and Elizabeth LeMay and William H. Sanders and Carol Muehrcke}, title = {Implementing the {ADVISE} security modeling formalism in M{\"{o}}bius}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575362}, doi = {10.1109/DSN.2013.6575362}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/FordKLSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/KeefeS13, author = {Ken Keefe and William H. Sanders}, editor = {Kaustubh R. Joshi and Markus Siegle and Mari{\"{e}}lle Stoelinga and Pedro R. D'Argenio}, title = {M{\"{o}}bius Shell: {A} Command-Line Interface for M{\"{o}}bius}, booktitle = {Quantitative Evaluation of Systems - 10th International Conference, {QEST} 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8054}, pages = {282--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40196-1\_24}, doi = {10.1007/978-3-642-40196-1\_24}, timestamp = {Sat, 30 Sep 2023 09:55:03 +0200}, biburl = {https://dblp.org/rec/conf/qest/KeefeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/LeMayFKSM11, author = {Elizabeth LeMay and Michael D. Ford and Ken Keefe and William H. Sanders and Carol Muehrcke}, title = {Model-based Security Metrics Using ADversary VIew Security Evaluation {(ADVISE)}}, booktitle = {Eighth International Conference on Quantitative Evaluation of Systems, {QEST} 2011, Aachen, Germany, 5-8 September, 2011}, pages = {191--200}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/QEST.2011.34}, doi = {10.1109/QEST.2011.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/LeMayFKSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/GaonkarKLRKS09, author = {Shravan Gaonkar and Ken Keefe and Ruth Lamprecht and Eric Rozier and Peter Kemper and William H. Sanders}, title = {Performance and dependability modeling with M{\"{o}}bius}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {36}, number = {4}, pages = {16--21}, year = {2009}, url = {https://doi.org/10.1145/1530873.1530878}, doi = {10.1145/1530873.1530878}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/GaonkarKLRKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CourtneyGKRS09, author = {Tod Courtney and Shravan Gaonkar and Ken Keefe and Eric Rozier and William H. Sanders}, title = {M{\"{o}}bius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {353--358}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270318}, doi = {10.1109/DSN.2009.5270318}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CourtneyGKRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/KeefeMRS09, author = {Ken Keefe and Quincy Mitchell and Eric Rozier and William H. Sanders}, title = {Remote Job Management in the Mobius Modeling Framework}, booktitle = {{QEST} 2009, Sixth International Conference on the Quantitative Evaluation of Systems, Budapest, Hungary, 13-16 September 2009}, pages = {209--210}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/QEST.2009.50}, doi = {10.1109/QEST.2009.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/KeefeMRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.