Ken Keefe

Former group member.

LinkedIn profile

Publications with the Performability Engineering Research Group

Performance and Dependability Modeling with Möbius.
S. Gaonkar, K. Keefe, R. Lamprecht, E. Rozier, P. Kemper, and W. H. Sanders. (08GAO03)
ACM SIGMETRICS Performance Evaluation Review, vol. 36, no. 4, March 2009, pp. 16-21. [ACM DOI: http://dx.doi.org/10.1145/1530873.1530878]

Möbius 2.3: An Extensible Tool for Dependability, Security, and Performance Evaluation of Large and Complex System Models.
T. Courtney, S. Gaonkar, K. Keefe, E. W. D. Rozier, and W. H. Sanders. (08COU01)
Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), Estoril, Lisbon, Portugal, June 29-July 2, 2009, pp. 353-358. [IEEE Xplore entry]

Remote Job Management in the Möbius Modeling Framework.
K. Keefe, Q. Mitchell, E. Rozier, and W. H. Sanders. (09GUL01)
Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009, Budapest, Hungary, September 13-16, 2009, pp. 209-210. [IEEE Xplore entry]

Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks.
E. Van Ruitenbeek, K. Keefe, W. H. Sanders, and C. Muehrcke. (10VAN01)
FastAbstract in the 2010 International Conference on Dependable Systems and Networks Supplemental, Chicago, Illinois, June 28-July 1, 2010, pp. 17-18.

Adversary-Driven State-Based System Security Evaluation.
E. LeMay, W. Unkenholz, D. Parks, C. Muehrcke, K. Keefe, and W. H. Sanders. (10VAN02)
Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec 2010), Bolzano-Bozen, Italy, Sept. 15, 2010.

Model-based Security Metrics using ADversary VIew Security Evaluation (ADVISE).
E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke. (11LEM01)
Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, Sept. 5-8, 2011, pp. 191-200. [IEEE Xplore entry]

Implementing the ADVISE Security Modeling Formalism in Möbius.
M. D. Ford, K. Keefe, E. LeMay, W. H. Sanders, and C. Muehrcke. (12FOR04)
Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013, pp. 1-8. [IEEE Xplore entry]

Möbius Shell: A Command-line Interface for Möbius.
K. Keefe and W. H. Sanders. (13KEE01)
Proceedings of the 10th International Conference on Quantitative Evaluation of SysTems (QEST 2013), Buenos Aires, Argentina, Aug. 27-30, 2013, Lecture Notes in Computer Science, vol. 8054, Springer, pp. 282-285. [The final publication is available at link.springer.com: Springer Link entry]

Simulation Debugging and Visualization in the Möbius Modeling Framework.
C. Buchanan and K. Keefe. (14BUC02)
Proceedings of the 11th International Conference on Quantitative Evaluation of Systems (QEST 2014), Florence, Italy, Sept. 8-10, 2014. Lecture Notes in Computer Science, vol. 8657 (G. Norman and W. Sanders, Eds.), pp. 226-240. Springer, 2014. [The final publication is available at link.springer.com: Springer Link entry]

An Ontological Model for Constructing Mobius ADVISE Security Models.
B. Feddersen, K. Keefe, W. H. Sanders, C. Muehrcke, D. Parks, A. Crapo, A. Gabaldon, and R. Palla. (15FED01)
Fast Abstract at the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Rio de Janeiro, Brazil, June 22-25, 2015. (Presented but not published in a proceedings.)

Enterprise Security Metrics with the ADVISE Meta Model Formalism.
B. Feddersen, K. Keefe, W. H. Sanders, C. Muehrcke, D. Parks, A. Crapo, A. Gabaldon, and R. Palla. (15FED02)
Proceedings of SECURWARE 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies, Venice, Italy, Aug. 23-28, 2015, pp. 65-66. [Official version in ThinkMind repository]

Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool.
K. Keefe and W. H. Sanders. (15KEE01)
Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools (Valuetools), Berlin, Germany, Dec. 14-16, 2015, pp. 164-170. [ACM DOI: http://dx.doi.org/10.4108/eai.14-12-2015.2262723]

A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE.
M. Rausch, B. Feddersen, K. Keefe, and W. H. Sanders. (16RAU01)
Proceedings of the 13th International Conference on Quantitative Evaluation of Systems (QEST 2016), Quebec City, Canada, August 23-25, 2016, Lecture Notes in Computer Science vol. 9826, Springer, pp. 279-294. [The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-43425-4_19]

A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher.
R. J. Wright, K. Keefe, B. Feddersen, and W. H. Sanders. (16WRI01)
Proceedings of the 11th International Conference on Critical Information Infrastructures Security (CRITIS), Paris, France, October 10-12, 2016, Lecture Notes in Computer Science no. 10242, Springer, Cham, 2017, pp. 252-264. [The final publication is available at link.springer.com.]

Accounting for the Human User in Predictive Security Models.
M. A. Noureddine, A. Marturano, K. Keefe, M. Bashir, and W. H. Sanders. (16NOU03)
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch, New Zealand, January 22-25, 2017, pp. 329-338. [IEEE Xplore entry]

A Microgrid Ontology for the Analysis of Cyber-Physical Security.
M. Backes, K. Keefe, and A. Valdes.
Proceedings of the 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2017), Pittsburgh, PA, April 21, 2017, pp. 1-6. [IEEE Xplore entry]

Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. [Springer SharedIt link]
M. Rausch, K. Keefe, B. Feddersen, and W. H. Sanders. (17RAU02)
In Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 9-13, 2017, Revised Selected Papers (G. D’Agostino and A. Scala, Eds.), pp. 156-167. Security and Cryptology, vol. 10707. Springer International Publishing, 2018.

Developing Models for Physical Attacks in Cyber-Physical Systems.
C. Cheh, K. Keefe, B. Feddersen, B. Chen, W. G. Temple, and W. H. Sanders. (17CHE04)
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), Dallas, Texas, Nov. 3, 2017, pp. 49-55. [ACM: https://doi.org/10.1145/3140241.3140249]

Modeling Humans: A General Agent Model for the Evaluation of Security.
M. Rausch, A. Fawaz, K. Keefe, and W. H. Sanders. (18RAU01)
Proceedings of the 15th International Conference on Quantitative Evaluation of SysTems (QEST 2018), Beijing, China, Sept. 4-7, 2018 (A. McIver and A. Horvath, Eds.), pp. 373-388. Lecture Notes in Computer Science, vol. 11024. Cham: Springer, 2018. [The final publication is available at link.springer.com: Springer Link entry]

An Ontology Framework for Generating Discrete-Event Stochastic Models.
K. Keefe, B. Feddersen, M. Rausch, R. Wright, and W. H. Sanders. (18KEE02)
Proceedings of the 15th European Performance Engineering Workshop (EPEW 2018), Paris, France, Oct. 29-30, 2018 (R. Bakhshi, P. Ballarini, B. Barbot, H. Castel-Taleb, and A. Remke, Eds.), pp. 173-189. Lecture Notes in Computer Science, vol. 11178. Cham: Springer, 2018. [The final publication is available at link.springer.com: Springer Link entry]

An Eclipse-Based Editor for SAN Templates.
L. Montecchi, P. Lollini, F. Moncini, and K. Keefe.
Proceedings of the 12th International Workshop on Software Engineering for Resilient Systems (SERENE), online virtual conference, September 7-10, 2020, to appear. [Final publication will be available on Springer Link]


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.