Follow
Nancy Mead
Nancy Mead
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
R Wieringa, N Maiden, N Mead, C Rolland
Requirements engineering 11, 102-107, 2006
11532006
Security quality requirements engineering (SQUARE) methodology
NR Mead, T Stehney
ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005
5052005
Survivability: Protecting your critical systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
IEEE Internet Computing 3 (6), 55-63, 1999
2741999
Software security engineering
JH Allen, S Barnum, RJ Ellison, G McGraw, NR Mead
Pearson India, 2008
2002008
Survivable network system analysis: A case study
RJ Ellison, RC Linger, T Longstaff, NR Mead
IEEE software 16 (4), 70-77, 1999
1851999
Requirements engineering and technology transfer: obstacles, incentives and improvement agenda
H Kaindl, S Brinkkemper, JA Bubenko Jr, B Farbey, SJ Greenspan, ...
Requirements engineering 7, 113-123, 2002
1812002
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst, 2000
1722000
Collaborations: closing the industry-academia gap
K Beckman, N Coulter, S Khajenoori, NR Mead
IEEE software 14 (6), 49-57, 1997
1691997
Requirements definition for survivable network systems
RC Linger, NR Mead, HF Lipson
Proceedings of IEEE International Symposium on Requirements Engineering: RE …, 1998
1341998
Industry/university collaborations: different perspectives heighten mutual opportunities
N Mead, K Beckman, J Lawrence, G O’Mary, C Parish, P Unpingco, ...
Journal of Systems and Software 49 (2-3), 155-162, 1999
921999
Software engineering education: How far we’ve come and how far we have to go
NR Mead
Journal of Systems and Software 82 (4), 571-575, 2009
852009
An approach to survivable systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
Nato ist symposium on protecting information systems in the 21st century …, 1999
631999
Case study in survivable network system analysis
R Ellison, R Linger, T Longstaff, N Mead
arXiv preprint cs/9811011, 1998
631998
Requirements engineering for survivable systems
NR Mead
522003
Threat modeling: diving into the deep end
JA Ingalsbe, L Kunimatsu, T Baeten, NR Mead
IEEE software 25 (1), 28-34, 2008
512008
Threat modeling the cloud computing, mobile device toting, consumerized enterprise–an overview of considerations
JA Ingalsbe, D Shoemaker, NR Mead
472011
The role of software architecture in requirements engineering
C Shekaran, D Garlan, M Jackson, NR Mead, C Potts, HB Reubenstein
Proceedings of IEEE International Conference on Requirements Engineering …, 1994
471994
Software assurance curriculum project volume 1: Master of software assurance reference curriculum
NR Mead, JH Allen, M Ardis, TB Hilburn, AJ Kornecki, R Linger, ...
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2010
462010
Life-cycle models for survivable systems
RC Linger, HF Lipson, J McHugh, NR Mead, CA Sledge
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2002
462002
Requirements prioritization introduction
N Mead
Carnegie Mellon University, 2006
442006
The system can't perform the operation now. Try again later.
Articles 1–20