Follow
Borislava I. Simidchieva
Borislava I. Simidchieva
Raytheon BBN
Verified email at bbn.com - Homepage
Title
Cited by
Cited by
Year
Insider Threat Identification by Process Analysis
M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, LA Clarke, ...
Proceedings of the 2014 Workshop on Research for Insider Threat (WRIT), 2014
782014
Representing process variation with a process family
BI Simidchieva, LA Clarke, LJ Osterweil
Software Process Dynamics and Agility: International Conference on Software …, 2007
722007
Modeling and analyzing faults to improve election process robustness
BI Simidchieva, SJ Engle, M Clifford, AC Jones, S Peisert, M Bishop, ...
Proceedings of the 2010 international conference on Electronic voting …, 2010
37*2010
Specifying and verifying requirements for election processes
BI Simidchieva, MS Marzilli, LA Clarke, LJ Osterweil
Proceedings of the 2008 international conference on Digital government …, 2008
282008
Desiderata for Languages to be Used in the Definition of Reference Business Processes.
L Zhu, LJ Osterweil, M Staples, U Kannengiesser, BI Simidchieva
Int. J. Software and Informatics 1 (1), 37-65, 2007
222007
Quantifying & Minimizing Attack Surfaces Containing Moving Target Defenses
N Soule, B Simidchieva, F Yaman, J Loyall, R Watro, M Atighetchi, ...
3rd International Symposium on Resilient Cyber Systems (ISRCS), 2015
212015
Structural considerations in defining executable process models
BI Simidchieva, LJ Osterweil, A Wise
International Conference on Software Process, 366-376, 2009
102009
Iterative analysis to improve key properties of critical human-intensive processes: an election security example
LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ...
ACM Transactions on Privacy and Security (TOPS) 20 (2), 1-31, 2017
92017
Experimentation support for cyber security evaluations
M Atighetchi, B Simidchieva, M Carvalho, D Last
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
92016
Categorizing and modeling variation in families of systems: a position paper
BI Simidchieva, LJ Osterweil
Proceedings of the Fourth European Conference on Software Architecture …, 2010
92010
Using Ontologies to Quantify Attack Surfaces
M Atighetchi, B Simidchieva, F Yaman, T Eskridge, M Carvalho, ...
11th International Conference on Semantic Technology for Intelligence …, 2016
82016
Automatic Quantification and Minimization of Attack Surfaces
M Atighetchi, B Simidchieva, N Soule, F Yaman, J Loyall, D Last, D Myers, ...
27th IEEE Software Technology Conference, 2015
62015
Systems and methods for automated system requirement analysis
MH Atighetchi, BI Simidchieva
US Patent 11,651,079, 2023
52023
An Autonomous Resiliency Toolkit – Needs, Challenges, and Concepts for Next Generation Cyber Defense Platforms
M Atighetchi, F Yaman, B Simidchieva, M Carvalho
Military Communications Conference (MILCOM), 2016
52016
Characterizing process variation (NIER Track)
BI Simidchieva, LJ Osterweil
Proceedings of the 33rd International Conference on Software Engineering …, 2011
42011
A comprehensive framework for using iterative analysis to improve human-intensive process security: An election example
LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ...
32017
Generation, composition, and verification of families of human-intensive systems
BI Simidchieva, LJ Osterweil
Proceedings of the 18th International Software Product Line Conference …, 2014
32014
Methods and systems for eliminating and reducing attack surfaces through evaluating reconfigurations
MH Atighetchi, BI Simidchieva
US Patent 11,297,081, 2022
22022
Security Requirements Analysis–A Vision for an Automated Toolchain
M Atighetchi, B Simidchieva, K Olejnik
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
22019
Using process definitions to drive user interactions with digital government systems
L Clarke, A Gaitenby, E Katsh, M Marzilli, L Osterweil, D Rainey, ...
ACM International Conference Proceeding Series 228, 310-311, 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20