Nancy Mead
Nancy Mead
Verified email at - Homepage
Cited by
Cited by
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
R Wieringa, N Maiden, N Mead, C Rolland
Requirements engineering 11, 102-107, 2006
Survivable network systems: An emerging discipline
RJ Ellison, DA Fisher, RC Linger, HF Lipson, T Longstaff, NR Mead
Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie …, 1997
Security quality requirements engineering (SQUARE) methodology
NR Mead, T Stehney
ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005
Survivability: Protecting your critical systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
IEEE Internet Computing 3 (6), 55-63, 1999
Software security engineering
JH Allen, S Barnum, RJ Ellison, G McGraw, NR Mead
Pearson India, 2008
Survivable network system analysis: A case study
RJ Ellison, RC Linger, T Longstaff, NR Mead
IEEE software 16 (4), 70-77, 1999
Collaborations: closing the industry-academia gap
K Beckman, N Coulter, S Khajenoori, NR Mead
IEEE software 14 (6), 49-57, 1997
Requirements engineering and technology transfer: obstacles, incentives and improvement agenda
H Kaindl, S Brinkkemper, JA Bubenko Jr, B Farbey, SJ Greenspan, ...
Requirements Engineering 7, 113-123, 2002
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
CMU/SEI, 2000
Requirements definition for survivable network systems
RC Linger, NR Mead, HF Lipson
Proceedings of IEEE International Symposium on Requirements Engineering: RE …, 1998
Industry/university collaborations: different perspectives heighten mutual opportunities
N Mead, K Beckman, J Lawrence, G O’Mary, C Parish, P Unpingco, ...
Journal of Systems and Software 49 (2-3), 155-162, 1999
Software engineering education: How far we’ve come and how far we have to go
NR Mead
Journal of Systems and Software 82 (4), 571-575, 2009
An approach to survivable systems
RJ Ellison, DA Fisher, RC Linger, HF Lipson, TA Longstaff, NR Mead
NATO IST Symposium on Protecting Information Systems in the 21st Century …, 1999
Case study in survivable network system analysis
R Ellison, R Linger, T Longstaff, N Mead
arXiv preprint cs/9811011, 1998
Threat modeling: Diving into the deep end
JA Ingalsbe, L Kunimatsu, T Baeten, NR Mead
IEEE software 25 (1), 28-34, 2008
A hybrid threat modeling method
NR Mead, F Shull, K Vemuru, O Villadsen
Carnegie MellonUniversity-Software Engineering Institute-Technical Report …, 2018
Requirements engineering for survivable systems
NR Mead
Carnegie Mellon University, Software Engineering Institute, 2003
The role of software architecture in requirements engineering
C Shekaran, D Garlan, M Jackson, NR Mead, C Potts, HB Reubenstein
Proceedings of IEEE International Conference on Requirements Engineering …, 1994
Threat modeling the cloud computing, mobile device toting, consumerized enterprise–an overview of considerations
JA Ingalsbe, D Shoemaker, NR Mead
Software assurance curriculum project volume I: Master of software assurance reference curriculum
NR Mead, JH Allen, M Ardis, TB Hilburn, AJ Kornecki, RC Linger, ...
Carnegie Mellon University, 2010
The system can't perform the operation now. Try again later.
Articles 1–20