Cheryl V. Hinds

According to our database1, Cheryl V. Hinds authored at least 6 papers between 1999 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Software Security: The Dangerous Afterthought.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2009
Efficient detection of compromised nodes in a wireless sensor network.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Detecting Compromised Nodes in a Wireless Sensor Network using Trust.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

Predicting Likelihood of Undergraduate Students graduating with Honors.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2007
Increasing security and usability of computer systems with graphical passwords.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

1999
Optimal placement of distributed interrelated data components using genetic algorithms.
Proceedings of the 37th Annual ACM Southeast Regional Conference, 1999


  Loading...