Follow
Nancy Mead
Nancy Mead
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
R Wieringa, N Maiden, N Mead, C Rolland
Requirements engineering 11, 102-107, 2006
13162006
Survivable network systems: An emerging discipline
RJ Ellison, DA Fisher, RC Linger, HF Lipson, T Longstaff
(No Title), 1997
7361997
Security quality requirements engineering (SQUARE) methodology
NR Mead, T Stehney
ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005
5512005
Survivability: Protecting your critical systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
IEEE Internet Computing 3 (6), 55-63, 1999
2781999
Software security engineering
JH Allen, S Barnum, RJ Ellison, G McGraw, NR Mead
Pearson India, 2008
2112008
Survivable network system analysis: A case study
RJ Ellison, RC Linger, T Longstaff, NR Mead
IEEE software 16 (4), 70-77, 1999
1921999
Collaborations: closing the industry-academia gap
K Beckman, N Coulter, S Khajenoori, NR Mead
IEEE software 14 (6), 49-57, 1997
1921997
Requirements engineering and technology transfer: obstacles, incentives and improvement agenda
H Kaindl, S Brinkkemper, JA Bubenko Jr, B Farbey, SJ Greenspan, ...
Requirements Engineering 7, 113-123, 2002
1802002
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
CMU/SEI, 2000
1692000
Requirements definition for survivable network systems
RC Linger, NR Mead, HF Lipson
Proceedings of IEEE International Symposium on Requirements Engineering: RE …, 1998
1321998
Industry/university collaborations: different perspectives heighten mutual opportunities
N Mead, K Beckman, J Lawrence, G O’Mary, C Parish, P Unpingco, ...
Journal of Systems and Software 49 (2-3), 155-162, 1999
981999
Software engineering education: How far we’ve come and how far we have to go
NR Mead
Journal of Systems and Software 82 (4), 571-575, 2009
912009
An approach to survivable systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
NATO IST Symposium on Protecting Information Systems in the 21st Century …, 1999
621999
Case study in survivable network system analysis
R Ellison, R Linger, T Longstaff, N Mead
arXiv preprint cs/9811011, 1998
611998
A hybrid threat modeling method
NR Mead, F Shull, K Vemuru, O Villadsen
Carnegie MellonUniversity-Software Engineering Institute-Technical Report …, 2018
602018
Threat modeling: Diving into the deep end
JA Ingalsbe, L Kunimatsu, T Baeten, NR Mead
IEEE software 25 (1), 28-34, 2008
592008
Requirements engineering for survivable systems
NR Mead
Carnegie Mellon University, Software Engineering Institute, 2003
512003
The role of software architecture in requirements engineering
C Shekaran, D Garlan, M Jackson, NR Mead, C Potts, HB Reubenstein
Proceedings of IEEE International Conference on Requirements Engineering …, 1994
511994
A portal for software security
NR Mead, G McGraw
IEEE Security & Privacy 3 (4), 75-79, 2005
482005
Threat modeling the cloud computing, mobile device toting, consumerized enterprise–an overview of considerations
JA Ingalsbe, D Shoemaker, NR Mead
472011
The system can't perform the operation now. Try again later.
Articles 1–20