Follow
Nancy Mead
Nancy Mead
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
R Wieringa, N Maiden, N Mead, C Rolland
Requirements engineering 11, 102-107, 2006
10872006
Security quality requirements engineering (SQUARE) methodology
NR Mead, T Stehney
ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005
4962005
Survivability: Protecting your critical systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
IEEE Internet Computing 3 (6), 55-63, 1999
2711999
Software security engineering
JH Allen, S Barnum, RJ Ellison, G McGraw, NR Mead
Pearson India, 2008
1972008
Survivable network system analysis: A case study
RJ Ellison, RC Linger, T Longstaff, NR Mead
IEEE software 16 (4), 70-77, 1999
1841999
Requirements engineering and technology transfer: obstacles, incentives and improvement agenda
H Kaindl, S Brinkkemper, JA Bubenko Jr, B Farbey, SJ Greenspan, ...
Requirements Engineering 7 (3), 113-123, 2002
1802002
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst, 2000
1702000
Collaborations: closing the industry-academia gap
K Beckman, N Coulter, S Khajenoori, NR Mead
IEEE software 14 (6), 49-57, 1997
1631997
Requirements definition for survivable network systems
RC Linger, NR Mead, HF Lipson
Proceedings of IEEE International Symposium on Requirements Engineering: RE …, 1998
1321998
Industry/university collaborations: different perspectives heighten mutual opportunities
N Mead, K Beckman, J Lawrence, G O’Mary, C Parish, P Unpingco, ...
Journal of Systems and Software 49 (2-3), 155-162, 1999
901999
Software engineering education: How far we’ve come and how far we have to go
NR Mead
Journal of Systems and Software 82 (4), 571-575, 2009
852009
An approach to survivable systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
Nato ist symposium on protecting information systems in the 21st century …, 1999
621999
Case study in survivable network system analysis
R Ellison, R Linger, T Longstaff, N Mead
arXiv preprint cs/9811011, 1998
621998
Threat modeling: diving into the deep end
JA Ingalsbe, L Kunimatsu, T Baeten, NR Mead
IEEE software 25 (1), 28-34, 2008
512008
Requirements engineering for survivable systems
NR Mead
492003
The role of software architecture in requirements engineering
C Shekaran, D Garlan, M Jackson, NR Mead, C Potts, HB Reubenstein
Proceedings of IEEE International Conference on Requirements Engineering …, 1994
471994
Threat modeling the cloud computing, mobile device toting, consumerized enterprise–an overview of considerations
JA Ingalsbe, D Shoemaker, NR Mead
462011
Software assurance curriculum project volume 1: Master of software assurance reference curriculum
NR Mead, JH Allen, M Ardis, TB Hilburn, AJ Kornecki, R Linger, ...
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2010
462010
Life-cycle models for survivable systems
RC Linger, HF Lipson, J McHugh, NR Mead, CA Sledge
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2002
442002
A portal for software security
NR Mead, G Mcgraw
IEEE Security & Privacy 3 (4), 75-79, 2005
432005
The system can't perform the operation now. Try again later.
Articles 1–20