BibTeX records: Ken Keefe

download as .bib file

@inproceedings{DBLP:conf/epew/KeefeFRWS18,
  author       = {Ken Keefe and
                  Brett Feddersen and
                  Michael J. Rausch and
                  Ronald Joseph Wright and
                  William H. Sanders},
  editor       = {Rena Bakhshi and
                  Paolo Ballarini and
                  Beno{\^{\i}}t Barbot and
                  Hind Castel{-}Taleb and
                  Anne Remke},
  title        = {An Ontology Framework for Generating Discrete-Event Stochastic Models},
  booktitle    = {Computer Performance Engineering - 15th European Workshop, {EPEW}
                  2018, Paris, France, October 29-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11178},
  pages        = {173--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02227-3\_12},
  doi          = {10.1007/978-3-030-02227-3\_12},
  timestamp    = {Tue, 07 May 2024 20:13:41 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/KeefeFRWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/RauschFKS18,
  author       = {Michael J. Rausch and
                  Ahmed M. Fawaz and
                  Ken Keefe and
                  William H. Sanders},
  editor       = {Annabelle McIver and
                  Andr{\'{a}}s Horv{\'{a}}th},
  title        = {Modeling Humans: {A} General Agent Model for the Evaluation of Security},
  booktitle    = {Quantitative Evaluation of Systems - 15th International Conference,
                  {QEST} 2018, Beijing, China, September 4-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11024},
  pages        = {373--388},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99154-2\_23},
  doi          = {10.1007/978-3-319-99154-2\_23},
  timestamp    = {Tue, 03 Mar 2020 12:16:34 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/RauschFKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChehKFCTS17,
  author       = {Carmen Cheh and
                  Ken Keefe and
                  Brett Feddersen and
                  Binbin Chen and
                  William G. Temple and
                  William H. Sanders},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {Developing Models for Physical Attacks in Cyber-Physical Systems},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {49--55},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140249},
  doi          = {10.1145/3140241.3140249},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChehKFCTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/RauschKFS17,
  author       = {Michael J. Rausch and
                  Ken Keefe and
                  Brett Feddersen and
                  William H. Sanders},
  editor       = {Gregorio D'Agostino and
                  Antonio Scala},
  title        = {Automatically Generating Security Models from System Models to Aid
                  in the Evaluation of {AMI} Deployment Options},
  booktitle    = {Critical Information Infrastructures Security - 12th International
                  Conference, {CRITIS} 2017, Lucca, Italy, October 8-13, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10707},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-99843-5\_14},
  doi          = {10.1007/978-3-319-99843-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/RauschKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/NoureddineMKBS17,
  author       = {Mohammad A. Noureddine and
                  Andrew Marturano and
                  Ken Keefe and
                  Masooda N. Bashir and
                  William H. Sanders},
  editor       = {Dong Seong Kim and
                  Masato Kitakami and
                  Vijay Varadharajan},
  title        = {Accounting for the Human User in Predictive Security Models},
  booktitle    = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017},
  pages        = {329--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PRDC.2017.58},
  doi          = {10.1109/PRDC.2017.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/NoureddineMKBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KeefeS16,
  author       = {Ken Keefe and
                  William H. Sanders},
  title        = {Reliability Analysis with Dynamic Reliability Block Diagrams in the
                  M{\"{o}}bius Modeling Tool},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262723},
  doi          = {10.4108/EAI.14-12-2015.2262723},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KeefeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/WrightKFS16,
  author       = {Ronald Joseph Wright and
                  Ken Keefe and
                  Brett Feddersen and
                  William H. Sanders},
  editor       = {Grigore M. Hav{\^{a}}rneanu and
                  Roberto Setola and
                  Hypatia Nassopoulos and
                  Stephen D. Wolthusen},
  title        = {A Case Study Assessing the Effects of Cyber Attacks on a River Zonal
                  Dispatcher},
  booktitle    = {Critical Information Infrastructures Security - 11th International
                  Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10242},
  pages        = {252--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-71368-7\_21},
  doi          = {10.1007/978-3-319-71368-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/WrightKFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/RauschFKS16,
  author       = {Michael J. Rausch and
                  Brett Feddersen and
                  Ken Keefe and
                  William H. Sanders},
  editor       = {Gul Agha and
                  Benny Van Houdt},
  title        = {A Comparison of Different Intrusion Detection Approaches in an Advanced
                  Metering Infrastructure Network Using {ADVISE}},
  booktitle    = {Quantitative Evaluation of Systems - 13th International Conference,
                  {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9826},
  pages        = {279--294},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43425-4\_19},
  doi          = {10.1007/978-3-319-43425-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/RauschFKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/NoureddineKSB15,
  author       = {Mohammad A. Noureddine and
                  Ken Keefe and
                  William H. Sanders and
                  Masooda N. Bashir},
  editor       = {David M. Nicol},
  title        = {Quantitative security metrics with human in the loop},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {21:1--21:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746215},
  doi          = {10.1145/2746194.2746215},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/NoureddineKSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/BuchananK14,
  author       = {Craig Buchanan and
                  Ken Keefe},
  editor       = {Gethin Norman and
                  William H. Sanders},
  title        = {Simulation Debugging and Visualization in the M{\"{o}}bius Modeling
                  Framework},
  booktitle    = {Quantitative Evaluation of Systems - 11th International Conference,
                  {QEST} 2014, Florence, Italy, September 8-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8657},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10696-0\_18},
  doi          = {10.1007/978-3-319-10696-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/BuchananK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/FordKLSM13,
  author       = {Michael D. Ford and
                  Ken Keefe and
                  Elizabeth LeMay and
                  William H. Sanders and
                  Carol Muehrcke},
  title        = {Implementing the {ADVISE} security modeling formalism in M{\"{o}}bius},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575362},
  doi          = {10.1109/DSN.2013.6575362},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/FordKLSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/KeefeS13,
  author       = {Ken Keefe and
                  William H. Sanders},
  editor       = {Kaustubh R. Joshi and
                  Markus Siegle and
                  Mari{\"{e}}lle Stoelinga and
                  Pedro R. D'Argenio},
  title        = {M{\"{o}}bius Shell: {A} Command-Line Interface for M{\"{o}}bius},
  booktitle    = {Quantitative Evaluation of Systems - 10th International Conference,
                  {QEST} 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8054},
  pages        = {282--285},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40196-1\_24},
  doi          = {10.1007/978-3-642-40196-1\_24},
  timestamp    = {Sat, 30 Sep 2023 09:55:03 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/KeefeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/LeMayFKSM11,
  author       = {Elizabeth LeMay and
                  Michael D. Ford and
                  Ken Keefe and
                  William H. Sanders and
                  Carol Muehrcke},
  title        = {Model-based Security Metrics Using ADversary VIew Security Evaluation
                  {(ADVISE)}},
  booktitle    = {Eighth International Conference on Quantitative Evaluation of Systems,
                  {QEST} 2011, Aachen, Germany, 5-8 September, 2011},
  pages        = {191--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/QEST.2011.34},
  doi          = {10.1109/QEST.2011.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/LeMayFKSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/GaonkarKLRKS09,
  author       = {Shravan Gaonkar and
                  Ken Keefe and
                  Ruth Lamprecht and
                  Eric Rozier and
                  Peter Kemper and
                  William H. Sanders},
  title        = {Performance and dependability modeling with M{\"{o}}bius},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {36},
  number       = {4},
  pages        = {16--21},
  year         = {2009},
  url          = {https://doi.org/10.1145/1530873.1530878},
  doi          = {10.1145/1530873.1530878},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/GaonkarKLRKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CourtneyGKRS09,
  author       = {Tod Courtney and
                  Shravan Gaonkar and
                  Ken Keefe and
                  Eric Rozier and
                  William H. Sanders},
  title        = {M{\"{o}}bius 2.3: An extensible tool for dependability, security,
                  and performance evaluation of large and complex system models},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {353--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270318},
  doi          = {10.1109/DSN.2009.5270318},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CourtneyGKRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/KeefeMRS09,
  author       = {Ken Keefe and
                  Quincy Mitchell and
                  Eric Rozier and
                  William H. Sanders},
  title        = {Remote Job Management in the Mobius Modeling Framework},
  booktitle    = {{QEST} 2009, Sixth International Conference on the Quantitative Evaluation
                  of Systems, Budapest, Hungary, 13-16 September 2009},
  pages        = {209--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/QEST.2009.50},
  doi          = {10.1109/QEST.2009.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/KeefeMRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}