Ken Keefe

452 total citations
11 papers, 265 citations indexed

About

Ken Keefe is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Ken Keefe has authored 11 papers receiving a total of 265 indexed citations (citations by other indexed papers that have themselves been cited), including 8 papers in Computer Networks and Communications, 8 papers in Information Systems and 5 papers in Signal Processing. Recurrent topics in Ken Keefe's work include Information and Cyber Security (8 papers), Network Security and Intrusion Detection (7 papers) and Advanced Malware Detection Techniques (5 papers). Ken Keefe is often cited by papers focused on Information and Cyber Security (8 papers), Network Security and Intrusion Detection (7 papers) and Advanced Malware Detection Techniques (5 papers). Ken Keefe collaborates with scholars based in United States, Singapore and Jamaica. Ken Keefe's co-authors include William H. Sanders, Michael Ford, William H. Sanders, Shravan Gaonkar, Tod Courtney, Peter Kemper, William G. Temple, Masooda Bashir, Binbin Chen and Alfonso Valdes and has published in prestigious journals such as SHILAP Revista de lepidopterología and ACM SIGMETRICS Performance Evaluation Review.

In The Last Decade

Ken Keefe

11 papers receiving 241 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ken Keefe United States 6 164 155 81 56 48 11 265
Barbara Kordy Luxembourg 5 228 1.4× 153 1.0× 45 0.6× 86 1.5× 50 1.0× 9 281
E.J. Byres Canada 6 103 0.6× 147 0.9× 138 1.7× 53 0.9× 19 0.4× 10 248
Pierre Bieber France 11 84 0.5× 92 0.6× 31 0.4× 38 0.7× 93 1.9× 28 312
Andrés J. Gonzalez Norway 12 70 0.4× 317 2.0× 25 0.3× 14 0.3× 21 0.4× 27 382
Leonardo Montecchi Italy 9 75 0.5× 78 0.5× 27 0.3× 19 0.3× 72 1.5× 50 209
Jun Ai China 10 197 1.2× 119 0.8× 30 0.4× 24 0.4× 177 3.7× 61 338
Elisabeth A. Strunk United States 8 82 0.5× 99 0.6× 31 0.4× 9 0.2× 92 1.9× 14 266
Wayne F. Boyer United States 4 419 2.6× 407 2.6× 59 0.7× 228 4.1× 42 0.9× 6 495
Paulo Romero Martins Maciel Brazil 11 142 0.9× 210 1.4× 18 0.2× 11 0.2× 46 1.0× 46 317
Guy Helmer United States 10 161 1.0× 304 2.0× 26 0.3× 148 2.6× 53 1.1× 12 412

Countries citing papers authored by Ken Keefe

Since Specialization
Citations

This map shows the geographic impact of Ken Keefe's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ken Keefe with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ken Keefe more than expected).

Fields of papers citing papers by Ken Keefe

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ken Keefe. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ken Keefe. The network helps show where Ken Keefe may publish in the future.

Co-authorship network of co-authors of Ken Keefe

This figure shows the co-authorship network connecting the top 25 collaborators of Ken Keefe. A scholar is included among the top collaborators of Ken Keefe based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ken Keefe. Ken Keefe is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

11 of 11 papers shown
1.
Keefe, Ken, et al.. (2017). Developing Models for Physical Attacks in Cyber-Physical Systems. 49–55. 10 indexed citations
2.
Keefe, Ken, et al.. (2017). A microgrid ontology for the analysis of cyber-physical security. 1–6. 2 indexed citations
3.
Keefe, Ken, et al.. (2017). Accounting for the Human User in Predictive Security Models. 329–338. 5 indexed citations
4.
Keefe, Ken & William H. Sanders. (2016). Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. SHILAP Revista de lepidopterología. 3 indexed citations
5.
Keefe, Ken, et al.. (2015). Enterprise Security Metrics with the ADVISE Meta Model Formalism. 65–66. 4 indexed citations
6.
Keefe, Ken, et al.. (2015). Quantitative security metrics with human in the loop. 1–2. 4 indexed citations
7.
Ford, Michael, et al.. (2013). Implementing the ADVISE security modeling formalism in Möbius. 1–8. 19 indexed citations
8.
Ford, Michael, et al.. (2011). Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE). 191–200. 106 indexed citations
9.
Keefe, Ken, et al.. (2010). Adversary-driven state-based system security evaluation. 1–9. 40 indexed citations
10.
Gaonkar, Shravan, et al.. (2009). Performance and dependability modeling with Möbius. ACM SIGMETRICS Performance Evaluation Review. 36(4). 16–21. 26 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026