Elizabeth (Van Ruitenbeek) LeMay

Former group member (MS, 2007; PhD, 2011).

Publications with the Performability Engineering Research Group

The Future Role of the ASEE National Organization in the Development of ASEE Student Chapters.
E. Van Ruitenbeek and M. Miletic. (07VAN02)
Proceedings of the 114th Annual American Society for Engineering Education Conference and Exposition, June 2007.

Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms.
E. Van Ruitenbeek, T. Courtney, W. H. Sanders, and F. Stevens. (06VAN01)
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgh, UK, June 25-28, 2007, pp. 790-800. [IEEE Xplore entry]

Modeling Mobile Phone Virus Propagation to Quantify Response Mechanism Effectiveness.
E. Van Ruitenbeek. (07VAN01)
Master’s Thesis, University of Illinois at Urbana-Champaign, 2007.

How to Maximize the Impact of ASEE Student Chapters.
E. Van Ruitenbeek. (08VAN01)
Proceedings of the American Society for Engineering Education Conference and Exposition, June 2008.

Modeling Peer-to-Peer Botnets.
E. Van Ruitenbeek and W. H. Sanders. (08VAN02)
Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST), St. Malo, France, September 14-17, 2008, pp. 307-316. [IEEE Xplore entry]

Promoting Undergraduate Research in ECE (PURE): Connecting Undergraduates with Graduate Research Mentors.
K. Xu and E. Van Ruitenbeek. (09VAN01)
Proceedings of the 116th Annual American Society for Engineering Education Conference and Exposition, Austin, Texas, June 14-17, 2009.

Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks.
E. Van Ruitenbeek, K. Keefe, W. H. Sanders, and C. Muehrcke. (10VAN01)
FastAbstract in the 2010 International Conference on Dependable Systems and Networks Supplemental, Chicago, Illinois, June 28-July 1, 2010, pp. 17-18.

Adversary-Driven State-Based System Security Evaluation.
E. LeMay, W. Unkenholz, D. Parks, C. Muehrcke, K. Keefe, and W. H. Sanders. (10VAN02)
Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec 2010), Bolzano-Bozen, Italy, Sept. 15, 2010.

Model-based Security Metrics using ADversary VIew Security Evaluation (ADVISE).
E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke. (11LEM01)
Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, Sept. 5-8, 2011, pp. 191-200. [IEEE Xplore entry]

Adversary-Driven State-Based System Security Evaluation.
E. A. LeMay. (11LEM02)
Ph.D. Thesis, University of Illinois at Urbana-Champaign, 2011.

Implementing the ADVISE Security Modeling Formalism in Möbius.
M. D. Ford, K. Keefe, E. LeMay, W. H. Sanders, and C. Muehrcke. (12FOR04)
Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013, pp. 1-8. [IEEE Xplore entry]


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.