Borislava I. Simidchieva
Borislava I. Simidchieva
Verified email at bbn.com - Homepage
TitleCited byYear
Representing process variation with a process family
BI Simidchieva, LA Clarke, LJ Osterweil
International Conference on Software Process, 109-120, 2007
642007
Insider Threat Identification by Process Analysis
M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, LA Clarke, ...
Proceedings of the 2014 Workshop on Research for Insider Threat (WRIT), 2014
422014
Modeling and analyzing faults to improve election process robustness
BI Simidchieva, SJ Engle, M Clifford, AC Jones, S Peisert, M Bishop, ...
Proceedings of the 2010 international conference on Electronic voting …, 2010
28*2010
Specifying and verifying requirements for election processes
BI Simidchieva, MS Marzilli, LA Clarke, LJ Osterweil
Proceedings of the 2008 international conference on Digital government …, 2008
282008
Desiderata for Languages to be Used in the Definition of Reference Business Processes.
L Zhu, LJ Osterweil, M Staples, U Kannengiesser, BI Simidchieva
Int. J. Software and Informatics 1 (1), 37-65, 2007
212007
Quantifying & Minimizing Attack Surfaces Containing Moving Target Defenses
N Soule, B Simidchieva, F Yaman, J Loyall, R Watro, M Atighetchi, ...
3rd International Symposium on Resilient Cyber Systems (ISRCS), 2015
132015
Structural considerations in defining executable process models
BI Simidchieva, LJ Osterweil, A Wise
International Conference on Software Process, 366-376, 2009
82009
Categorizing and modeling variation in families of systems: a position paper
BI Simidchieva, LJ Osterweil
Proceedings of the Fourth European Conference on Software Architecture …, 2010
62010
Iterative analysis to improve key properties of critical human-intensive processes: An election security example
LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ...
ACM Transactions on Privacy and Security (TOPS) 20 (2), 5, 2017
52017
Automatic Quantification and Minimization of Attack Surfaces
M Atighetchi, B Simidchieva, N Soule, F Yaman, J Loyall, D Last, D Myers, ...
27th IEEE Software Technology Conference, 2015
52015
Experimentation support for cyber security evaluations
M Atighetchi, B Simidchieva, M Carvalho, D Last
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
42016
Characterizing process variation (NIER Track)
BI Simidchieva, LJ Osterweil
Proceedings of the 33rd International Conference on Software Engineering …, 2011
42011
Using Ontologies to Quantify Attack Surfaces
M Atighetchi, B Simidchieva, F Yaman, T Eskridge, M Carvalho, ...
11th International Conference on Semantic Technology for Intelligence …, 2016
32016
Generation, composition, and verification of families of human-intensive systems
BI Simidchieva, LJ Osterweil
Proceedings of the 18th International Software Product Line Conference …, 2014
32014
An Autonomous Resiliency Toolkit – Needs, Challenges, and Concepts for Next Generation Cyber Defense Platforms
M Atighetchi, F Yaman, B Simidchieva, M Carvalho
Military Communications Conference (MILCOM), 2016
22016
Using process definitions to drive user interactions with digital government systems
L Clarke, A Gaitenby, E Katsh, M Marzilli, L Osterweil, D Rainey, ...
Proceedings of the 8th annual international conference on Digital government …, 2007
22007
A Comprehensive Framework for Using Iterative Analysis to Improve Human-Intensive Process Security: An Election Example
LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ...
12017
Attack Surface Reasoning (ASR)
MN Soule, B Simidchieva, F Yaman, R Watro, J Loyall, MM Atighetchi, ...
2015
Variation in Human-Intensive Systems: a Conceptual Framework for Characterizing, Modeling, and Analyzing Families of Systems
BI Simidchieva
University of Massachusetts Amherst, 2015
2015
Examining the role of iteration in the complete lifecycle of a traceability-oriented software development process
SC Christov, BI Simidchieva
Journal of Computing Sciences in Colleges 21 (6), 266-267, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–20