Nancy R. Mead
American computer scientist
Nancy R. Mead's AcademicInfluence.com Rankings
Download Badge
Computer Science
Nancy R. Mead's Degrees
- PhD Computer Science University of Maryland, College Park
Similar Degrees You Can Earn
Why Is Nancy R. Mead Influential?
(Suggest an Edit or Addition)According to Wikipedia, Nancy Rose Mead is an American computer scientist. She is known for her contributions to security, software engineering education and requirements. Background and education Mead spent her childhood in New Jersey, growing up in a 2nd generation Armenian immigrant family. She had an early interest in mathematics. This led to a mathematics major at New York University. from which she received a BA in mathematics and French in 1963, and an MS in mathematics in 1967. Mead received her PhD in mathematics in 1983 from the Polytechnic Institute of New York . Her thesis, "Complexity Measures for System Design", was supervised by Stanley Preiser.
Nancy R. Mead's Published Works
Published Works
- Requirements engineering paper classification and evaluation criteria: a proposal and a discussion (2005) (840)
- Survivable Network Systems: An Emerging Discipline (1997) (507)
- Security quality requirements engineering (SQUARE) methodology (2005) (411)
- Survivability: Protecting Your Critical Systems (1999) (168)
- Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda (2002) (159)
- Survivable Network System Analysis: A Case Study (1999) (117)
- Software Security Engineering: A Guide for Project Managers (2004) (111)
- Collaborations: Closing the Industry-Academia Gap (1997) (103)
- Survivable Network Analysis Method (2000) (91)
- Requirements definition for survivable network systems (1998) (66)
- Software Engineering Education: How Far We've Come and How Far We Have to Go (2008) (59)
- Industry/university collaborations: different perspectives heighten mutual opportunities (1999) (56)
- A Portal for Software Security (2005) (49)
- Threat Modeling: Diving into the Deep End (2008) (47)
- Case Study in Survivable Network System Analysis (1998) (46)
- Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum (2010) (44)
- The role of software architecture in requirements engineering (1994) (42)
- Computer-Aided Privacy Requirements Elicitation Technique (2008) (40)
- Security Requirements Engineering for Software Systems: Case Studies in Support of Software Engineering Education (2006) (37)
- Integrating agile practices into software engineering courses (2002) (35)
- Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations (2011) (34)
- Life-Cycle Models for Survivable Systems (2002) (32)
- SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies (2004) (31)
- Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method (2007) (31)
- How To Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods (2007) (29)
- Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines (2010) (29)
- Requirements Engineering for Survivable Systems (2003) (27)
- An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method (2000) (27)
- Can We Ever Build Survivable Systems from COTS Components? (2002) (26)
- Incorporating Security Requirements Engineering into the Dynamic Systems Development Method (2008) (25)
- Software Assurance Competency Model (2013) (23)
- Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models (2008) (21)
- Software Engineering Programs: Dispelling the Myths and Misconceptions (2002) (21)
- Adapting the SQUARE Process for Privacy Requirements Engineering (2010) (19)
- Making the Business Case for Software Assurance (2009) (18)
- Software Security Engineering (2008) (18)
- SURVIVABILITY : PROTECTING YOUR CRITICAL SYSTE CRITICAL SYSTEMS (1999) (17)
- Security Quality Requirements Engineering (SQUARE): Case Study Phase III (2006) (17)
- Integrating privacy requirements considerations into a security requirements engineering method and tool (2011) (16)
- System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System (2004) (16)
- Privacy Risk Assessment in Privacy Requirements Engineering (2009) (16)
- Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets (2007) (16)
- Foundations for Survivable Systems Engineering (2002) (15)
- Industry/University software engineering collaborations for the successful reeducation of non-software professionals (2003) (14)
- Security Requirements Reusability and the SQUARE Methodology (2010) (13)
- Issues in licensing and certification of software engineers (1997) (13)
- Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods (2010) (12)
- Managing Software Development for Survivable Systems (2001) (12)
- Software Assurance Curriculum Project Volume IV: Community College Education (2011) (12)
- The Survivability Imperative: Protecting Critical Systems (2000) (12)
- A Comparison of the Software Assurance Common Body of Knowledge to Common Curricular Standards (2007) (12)
- The State Of Software Engineering Education And Training [Guest Editor's Introduction] (1997) (12)
- Incorporating Security Requirements Engineering into Standard Lifecycle Processes (2008) (11)
- Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (2004) (11)
- Who is liable for insecure systems? (2004) (11)
- Industry-University Partnerships: The Wave of the Future? (1996) (10)
- Industry/University Collaboration in Software Engineering Education: Refreshing and Retuning Our Strategies (2015) (10)
- Characteristics of Successful Collaborations to Produce Educated Software Engineering Professionals (2002) (10)
- Experiences in Eliciting Security Requirements (2006) (9)
- Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling (2017) (9)
- Integrating Privacy Requirements into Security Requirements Engineering (2009) (9)
- Foundations for Software Assurance (2012) (9)
- Advances in Software Engineering and Software Assurance (2016) (8)
- Measuring the Software Security Requirements Engineering Process (2012) (8)
- Software Assurance Curriculum Project Volume III: Master of Software Assurance Course Syllabi (2011) (8)
- Software Assurance (2014) (8)
- Reeducation to Expand the Software Engineering Workforce: Successful Industry/University Collaborations (2002) (8)
- Best Training Practices Within the Software Engineering Industry (1996) (8)
- Why is it so difficult to introduce requirements engineering research results into mainstream requirements engineering practice? (2000) (8)
- Advancing Software Assurance with Public-Private Collaboration (2010) (8)
- A Method and Case Study for Using Malware Analysis to Improve Security Requirements (2015) (8)
- Development of a Master of Software Assurance Reference Curriculum (2010) (7)
- Building Security In: A Road to Competency (2013) (7)
- Teaching Security Requirements Engineering Using SQUARE (2009) (7)
- Ensuring Cost Efficient and Secure Software through Student Case Studies in Risk and Requirements Prioritization (2009) (7)
- Requirements engineering in practice: making the business case for requirements engineering (2003) (7)
- Integrating Software Assurance Knowledge Into Conventional Curricula (2008) (7)
- A Risk-Management Approach to the Design of Survivable COTS-Based Systems (2001) (7)
- The Carnegie Mellon University Master of Software Engineering specialization tracks (1996) (6)
- Software Assurance Measurement -- State of the Practice (2013) (6)
- Current accreditation, certification, and licensure activities related to software engineering (1999) (6)
- An Evaluation of A-SQUARE for COTS Acquisition (2014) (6)
- Incorporating Security Requirements Engineering into the Rational Unified Process (2008) (6)
- Software Engineering as a Professional Discipline (2001) (6)
- A history of the international requirements engineering conference (RE)RE@21 (2013) (5)
- An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Software Engineering Work (2008) (5)
- Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering (2010) (5)
- Building a Body of Knowledge for ICT Supply Chain Risk Management (2013) (5)
- Software Engineering: Graduate-Level Courses for AFIT Professional Continuing Education (1991) (5)
- Computer security: Art and science [Book Review] (2003) (5)
- New Year's Resolutions for Software Quality (2004) (4)
- Half a Century of Software Engineering Education: The CMU Exemplar (2018) (4)
- Education Trends and Their Impact on Management of Software Engineering Education (1995) (4)
- The software assurance competency model: A roadmap to enhance individual professional capability (2013) (4)
- A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work (2009) (4)
- Meeting Industry Needs for Secure Software Development (2016) (3)
- MAINTAINING ITS CORPORATE IMPACT THROUGH A GOVERNANCE FRAMEWORK (2007) (3)
- Adapting the SQUARE Method for Security Requirements Engineering to Acquisition (2010) (3)
- Building Security In: Preparing for a Software Security Career (2013) (3)
- Industrial input to the computing curriculum (2004) (3)
- International Liability Issues for Software Quality (2003) (3)
- Adapting a Software Acquisition Curriculum to Instruct Supply Chain Risk Management in a Project-Based Software Development Course (2021) (3)
- Principles and Measurement Models for Software Assurance (2013) (3)
- The Development of a Graduate Curriculum for Software Assurance (2011) (3)
- SQUARE-Lite: Case Study on VADSoft Project (2008) (3)
- Using a multi-level design method under DOD-STD-2167A (1989) (3)
- Cyber Security Requirements Methodology (2018) (3)
- Security Engineering FY17 Systems Aware Cybersecurity (2017) (3)
- Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives (2011) (3)
- Shortages of qualified software engineering faculty and practitioners (panel session): challenges in breaking the cycle (2000) (2)
- Security and Privacy Requirements Engineering (2019) (2)
- Cyber security engineering (2017) (2)
- How Well Can Students Read and Write? Issuegram 9. (1983) (2)
- Cyber Sciences and Software Engineering (2015) (2)
- Models for Assessing the Cost and Value of Software Assurance (2014) (2)
- SEHAS 2003: The Future of High-Assurance Systems (2003) (2)
- Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education (2020) (2)
- Engineering Security Into the Software Development Life Cycle (2005) (2)
- ICSE 2003 workshop on software engineering for high assurance systems: synergies between process, product, and profiling (SEHAS 2003) (2003) (2)
- A Common Sense Way to Make the Business Case for Software Assurance (2008) (2)
- Assuring Software Systems Security: Life Cycle Considerations for Government Acquisitions (2007) (2)
- An Evaluation of Cost-Benefit Using Security Requirements Prioritization (2014) (2)
- Integrating the Master of Software Assurance Reference Curriculum into the Model Curriculum and Guidelines for Graduate Degree Programs in Information Systems (2011) (2)
- A Research Agenda for Survivable Systems (2000) (2)
- Issues in software engineering for survivable systems (panel) (1999) (1)
- Combining Security and Privacy in Requirements Engineering (2012) (1)
- On the Feasibility of Specialization within Software Engineering Degree Programs (2007) (1)
- Integrating Secure Software Assurance Content with SE2004 Recommendations (2008) (1)
- Software Security Engineering: A Key Discipline for Project Managers (2008) (1)
- Software Professionalism - Is it 'Good Enough?' (2015) (1)
- Threat Modeling the Enterprise (2008) (1)
- Teaching Secure Acquisition in Higher Education (2020) (1)
- Building Assured Systems Framework (2010) (1)
- Novel Methods of Incorporating Security Requirements Engineering into Software Engineering Courses and Curricula (2009) (1)
- Roundtable on Information Security Policy (2000) (1)
- Defining the Discipline of Secure Software Assurance: Initial Findings from the National Software Assurance Repository (2010) (1)
- Building a Foundation (2003) (1)
- Requirements Engineering for Survivable Systems. Networked Systems Survivability (2003) (1)
- Incorporating CC2020 and SWECOM Competencies into Software Engineering Curricula: A Tutorial (2020) (1)
- Using Integer Programming to Optimize Investments in Security Countermeasures: A Practical Tool for Fixed Budgets (2006) (1)
- Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals (2014) (1)
- Guest Editors' Introduction: The State of Software Engineering Education and Training (1997) (1)
- Crafting the Future of Software Engineering Education in CC2020: A Workshop (2017) (1)
- A classification of RE papers:(A)re we researching or designing RE techniques? (2005) (1)
- Preliminary Extension to Address Law Compliance of Manufacturing Systems (2016) (0)
- 2010 CERT Research Report (2011) (0)
- Infusing software assurance and secure coding into introductory CS courses (abstract only) (2012) (0)
- The CMU Master of Software Engineering Specialization Tracks (1996) (0)
- What do you mean I'm practicing without a license? certification and licensing of requirements engineering professionals (2000) (0)
- From the Publisher You Cannot Pass the Buck on Reliable Network Security (2000) (0)
- Everything you ever wanted to know about software engineering education, but were afraid to ask (panel) (1998) (0)
- Using Cybersecurity Body of Knowledge (CyBOK) Case Studies to Enhance Student Learning (2022) (0)
- Preface (2000) (0)
- Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19) (2019) (0)
- Welcome from the Organizers (2018) (0)
- Abstract : Intrusion Scenarios for Security Requirements Engineering (2001) (0)
- Critical Infrastructure Protection and Supply Chain Risk Management (2022) (0)
- A report on the 1999 Conference on Software Engineering Education and Training (1999) (0)
- Moving Secure Software Assurance into Higher Education: A Roadmap for Change (2011) (0)
- Ninth Conference on Software Engineering Education : proceedings, April 21-24, 1996, Daytona Beach, Florida (1996) (0)
- Managing software engineering education in diverse environments (1995) (0)
- 2nd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2015) (2015) (0)
- Workshop 3: Integrating Agile Practices into Software Engineering Courses (2002) (0)
- Guest Editor's Introduction: Malicious IT (2000) (0)
- Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (2016) (0)
- Report Writer and Security Requirements Finder: User and Admin Manuals (2016) (0)
- Software Requirements Engineering - Preface (1997) (0)
- Issues in Software Engineering for Survivable Systems (1999) (0)
- Elicitation Methods Experiences in Eliciting Security Requirements (2006) (0)
- Software Engineering - The State of the Profession (1999) (0)
- Systems Assurance as a Team Sport (2010) (0)
- A Hybrid Thread Modeling Method (2021) (0)
- 2nd International Workshop on Requirements Engineering for High Assurance Systems (rhas '03) 2nd International Workshop on Requirements Engineering for High Assurance Systems (rhas '03) in Conjunction with the 11th Ieee International Requirements Engineering Conference (re '03) Welcome from the Rhas (2003) (0)
- Panel: industry/university collaborations: what makes them tick? (1999) (0)
- Designing Ada software for maintainability (1988) (0)
- Building Security in Software Security: Strong Philosophy, Weak Practice a Portal for Software Security Building Security in the Bsi Software Assurance Initiative Bsi Content Catalog Software Assurance Aspects (2005) (0)
- Software Assurance Curriculum Master Bibliography and Course References (2011) (0)
- A Standard Best Practice Approach to Acquisition of Secure ICT Products (2014) (0)
- Panel: Issues in Software Engineering for Survivable Systems. (1999) (0)
- Two Nationally Sponsored Initiatives for Disseminating Assurance Knowledge (2014) (0)
- Malicious IT - Guest Editors' Introduction (2000) (0)
- Position Statement: The Impact of Software Assurance on Computing Education (2008) (0)
- Results of SEI Independent (2004) (0)
- Using Malware Analysis to Tailor SQUARE for Mobile Platforms (2014) (0)
This paper list is powered by the following services:
Other Resources About Nancy R. Mead
What Schools Are Affiliated With Nancy R. Mead?
Nancy R. Mead is affiliated with the following schools: