Kevin Curran

Orcid: 0000-0001-5237-5355

Affiliations:
  • Ulster University, UK


According to our database1, Kevin Curran authored at least 204 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Improving Data Glove Accuracy and Usability Using a Neural Network When Measuring Finger Joint Range of Motion.
Sensors, 2022

2021
Review of Wearable Sensor-Based Health Monitoring Glove Devices for Rheumatoid Arthritis.
Sensors, 2021

Reliability and Validity of Clinically Accessible Smart Glove Technologies to Measure Joint Range of Motion.
Sensors, 2021

After the pandemic: securing smart cities.
Netw. Secur., 2021

Wireless Interference Analysis for Home IoT Security Vulnerability Detection.
Int. J. Wirel. Networks Broadband Technol., 2021

Detection of Anonymising Proxies Using Machine Learning.
Int. J. Digit. Crime Forensics, 2021

Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses.
Int. J. Digit. Crime Forensics, 2021

2020
A multimodal smartphone sensor system for behaviour measurement and health status inference.
Inf. Fusion, 2020

Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network.
Int. J. Wirel. Networks Broadband Technol., 2020

Detection of Virtual Private Network Traffic Using Machine Learning.
Int. J. Wirel. Networks Broadband Technol., 2020

A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC.
Int. J. Wirel. Networks Broadband Technol., 2020

A Novel AI-enabled Framework to Diagnose Coronavirus COVID 19 using Smartphone Embedded Sensors: Design Study.
CoRR, 2020

Echo state network-based feature extraction for efficient color image segmentation.
Concurr. Comput. Pract. Exp., 2020

A Novel AI-enabled Framework to Diagnose Coronavirus COVID-19 using Smartphone Embedded Sensors: Design Study.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

2019
Chatbots for online banking services.
Web Intell., 2019

An investigation into smartphone based weakly supervised activity recognition systems.
Pervasive Mob. Comput., 2019

The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying.
Int. J. Data Warehous. Min., 2019

Evaluating User Engagement with a Reminiscence App Using Cross-Comparative Analysis of User Event Logs and Qualitative Data.
Cyberpsychology Behav. Soc. Netw., 2019

2018
An overview of steganography techniques applied to the protection of biometric data.
Multim. Tools Appl., 2018

Detecting the Use of Anonymous Proxies.
Int. J. Digit. Crime Forensics, 2018

Hybrid passive and active approach to tracking movement within indoor environments.
IET Commun., 2018

An IoT Framework for Detecting Movement Within Indoor Environments.
Proceedings of the Machine Learning for Networking - First International Conference, 2018

Addressing the Problem of Activity Recognition with Experience Sampling and Weak Learning.
Proceedings of the Intelligent Systems and Applications, 2018

Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Automatic Prediction of Health Status Using Smartphone-Derived Behavior Profiles.
IEEE J. Biomed. Health Informatics, 2017

Text based steganography.
Int. J. Inf. Priv. Secur. Integr., 2017

Cyber-physical systems and context-aware sensing and computing.
Comput. Networks, 2017

Blood vessel segmentation in retinal images using echo state networks.
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017

Behavioural Usage Analysis of a Reminiscing App for People Living with Dementia and their Carers.
Proceedings of the European Conference on Cognitive Ergonomics, 2017

2016
Location and Mobility-Aware Routing for Improving Multimedia Streaming Performance in MANETs.
Wirel. Pers. Commun., 2016

The performance cost of preserving data/query privacy using searchable symmetric encryption.
Secur. Commun. Networks, 2016

Location and mobility-aware routing for multimedia streaming in disaster telemedicine.
Ad Hoc Networks, 2016

How Usable Are Usability Tests? Examining the Suitability of Standard Usability Testing Methods for the Assessment of Apps for People Living with Dementia.
Proceedings of the New Technologies to Improve Patient Rehabilitation - 4th Workshop, 2016

Assessing usability testing for people living with dementia.
Proceedings of the 4th Workshop on ICTs for improving Patients Rehabilitation Research Techniques, 2016

Crowdsourced Data Collection of Physical Activity and Health Status: An App Solution.
Proceedings of the Wireless Mobile Communication and Healthcare, 2016

An experimental evaluation of echo state network for colour image segmentation.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

How IBM Watson Can Help Us Understand Character in Shakespeare: A Cognitive Computing Approach to the Plays.
Proceedings of the 11th Annual International Conference of the Alliance of Digital Humanities Organizations, 2016


2015
Pattern Matching Techniques for Replacing Missing Sections of Audio Streamed across Wireless Networks.
ACM Trans. Intell. Syst. Technol., 2015

Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs.
Peer-to-Peer Netw. Appl., 2015

Security evaluation of the OAuth 2.0 framework.
Inf. Comput. Secur., 2015

Designing a Compact Wireless Network based Device-free Passive Localisation System for Indoor Environments.
Int. J. Wirel. Networks Broadband Technol., 2015

Glove-Based Technology in Hand Rehabilitation.
Int. J. Innov. Digit. Econ., 2015

Mobile device security.
Int. J. Inf. Comput. Secur., 2015

Drones and Privacy.
Int. J. Handheld Comput. Res., 2015

A Novel Cue based Picture Word Shape Character Password Creation Scheme.
Int. J. Digit. Crime Forensics, 2015

The detection of empty resist bottles or air in the resist lines of a photolithography coating tool.
Int. J. Comput. Integr. Manuf., 2015

A Context-Aware Mobility Indoor Positioning System.
Int. J. Adapt. Resilient Auton. Syst., 2015

Opportunistic Neighbour Prediction Using an Artificial Neural Network.
Int. J. Adv. Pervasive Ubiquitous Comput., 2015

Securing the internet through the detection of anonymous proxy usage.
Proceedings of the 2015 World Congress on Internet Security, 2015

Personal Sensing Wear: The Role of Textile Sensors.
Proceedings of the Posters, Demos, Late-breaking Results and Workshop Proceedings of the 23rd Conference on User Modeling, Adaptation, and Personalization (UMAP 2015), Dublin, Ireland, June 29, 2015

CAPTURE - Extending the scope of self-localization in Indoor Positioning Systems.
Proceedings of the 2015 International Conference on Indoor Positioning and Indoor Navigation, 2015

2014
Social Networking Analysis.
Proceedings of the Big Data and Internet of Things: A Roadmap for Smart Environments, 2014

Detecting Anonymising Proxy Usage on the Internet.
Wirel. Pers. Commun., 2014

Editorial to the Special Section on Ambient Intelligence and Assistive Technologies for Cognitive Impaired People.
IEEE J. Biomed. Health Informatics, 2014

A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2014

Detection of Social Interaction Using Mobile Phones via Device Free Passive Localisation.
Int. J. Handheld Comput. Res., 2014

An Active Low Cost Mesh Networking Indoor Tracking System.
Int. J. Ambient Comput. Intell., 2014

Detection of multi-occupancy using device-free passive localisation.
IET Wirel. Sens. Syst., 2014

To wireless fidelity and beyond - CAPTURE, extending indoor positioning systems.
Proceedings of the 2014 Ubiquitous Positioning Indoor Navigation and Location Based Service, 2014

CAPTURE - Cooperatively applied positioning techniques utilizing range extensions.
Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation, 2014

2013
A self-similarity approach to repairing large dropouts of streamed music.
ACM Trans. Multim. Comput. Commun. Appl., 2013

IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario.
Simul. Model. Pract. Theory, 2013

A novel approach to digital watermarking, exploiting colour spaces.
Signal Process., 2013

Probabilistic indoor human movement modeling to aid first responders.
J. Ambient Intell. Humaniz. Comput., 2013

Social Networking in Education.
Int. J. Innov. Digit. Econ., 2013

Social Networking and Health.
Int. J. Innov. Digit. Econ., 2013

A Survey of Geographical Routing in Wireless Ad-Hoc Networks.
IEEE Commun. Surv. Tutorials, 2013

Context-aware intelligent recommendation system for tourism.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Novel smart sensor glove for arthritis rehabiliation.
Proceedings of the 2013 IEEE International Conference on Body Sensor Networks, 2013

Novel smart sensor glove for arthritis rehabiliation.
Proceedings of the 2013 IEEE International Conference on Body Sensor Networks, 2013

2012
WS-I* compliant web service SOAP message security performance.
Int. J. Web Sci., 2012

A practical network coding and routing scheme based on maximum flow combination.
Int. J. Netw. Manag., 2012

HTML5 and the Mobile Web.
Int. J. Innov. Digit. Econ., 2012

OpenStreetMap.
Int. J. Interact. Commun. Syst. Technol., 2012

Using acoustic sensors to discriminate between nasal and mouth breathing.
Int. J. Bioinform. Res. Appl., 2012

A dynamic threshold approach for skin tone detection in colour images.
Int. J. Biom., 2012

HABITS: a Bayesian filter approach to indoor tracking and location.
Int. J. Bio Inspired Comput., 2012

Man in the Browser Attacks.
Int. J. Ambient Comput. Intell., 2012

A survey of active and passive indoor localisation systems.
Comput. Commun., 2012

MANET Location Prediction Using Machine Learning Algorithms.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

Guiding robots through wireless location positioning.
Proceedings of the 2012 IEEE International Conference on Technologies for Practical Robot Applications, 2012

Support Vector Machine Classification in a Device-Free Passive Localisation (DfPL) Scenario.
Proceedings of the Image Processing and Communications Challenges 4, 2012

A new method to determine joint range of movement and stiffness in rheumatoid arthritic patients.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2011
An evaluation of indoor location determination technologies.
J. Locat. Based Serv., 2011

Learning indoor movement habits for predictive control.
Int. J. Space Based Situated Comput., 2011

Cheating in Exams with Technology.
Int. J. Cyber Ethics Educ., 2011

The Role of Twitter in the World of Business.
Int. J. Bus. Data Commun. Netw., 2011

The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking.
Int. J. Ambient Comput. Intell., 2011

The Role of Augmented Reality within Ambient Intelligence.
Int. J. Ambient Comput. Intell., 2011

The Problems of Jurisdiction on the Internet.
Int. J. Ambient Comput. Intell., 2011

Cloud Computing Security.
Int. J. Ambient Comput. Intell., 2011

Wearable rehab technology for automatic measurement of patients with arthritis.
Proceedings of the 5th International Conference on Pervasive Computing Technologies for Healthcare, 2011

Radio Communication Protocols in a History Aware Device-free Passive (DfP) Localisation.
Proceedings of the Image Processing and Communications Challenges 3, 2011

A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Embed, Track and Authenticate Images Online with SDW-WebCrawler.
Proceedings of the 2011 Irish Machine Vision and Image Processing Conference, 2011

2010
Digital image steganography: Survey and analysis of current methods.
Signal Process., 2010

Mobile Phone Forensic Analysis.
Int. J. Digit. Crime Forensics, 2010

Context-Awareness in Ambient Intelligence.
Int. J. Ambient Comput. Intell., 2010

An Activity Monitoring Application for Windows Mobile Devices.
Int. J. Ambient Comput. Intell., 2010

Ambient Interface Design (AID) for the Ergonomically Challenged.
Int. J. Ambient Comput. Intell., 2010

Managing Step Changes in Information System Support: Lessons from an Industrial Study.
Proceedings of the Information Systems Development, 2010

An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Evaluation of Smoothing Algorithms for a RSSI-Based Device-Free Passive Localisation.
Proceedings of the Image Processing and Communications Challenges 2, 2010

A Watermarking Based Tamper Detection Solution for RFID Tags.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A dynamic threshold approach for skin segmentation in color images.
Proceedings of the International Conference on Image Processing, 2010

Towards objectifying information hiding.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
A computational intelligence method for traversing dynamically constructed networks of knowledge.
Telecommun. Syst., 2009

A skin tone detection algorithm for an adaptive approach to steganography.
Signal Process., 2009

A secure and improved self-embedding algorithm to combat digital document forgery.
Signal Process., 2009

Optimising mobile phone self-location estimates by introducing beacon characteristics to the algorithm.
J. Locat. Based Serv., 2009

Ambient Middleware for Context-Awareness (AMiCA).
Int. J. Ambient Comput. Intell., 2009

Ambient Communication Experience (ACE).
Int. J. Ambient Comput. Intell., 2009

RFID-Enabled Location Determination Within Indoor Environments.
Int. J. Ambient Comput. Intell., 2009

Improved Blind Watermarking of 3D Objects Based on Partition.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A new colour space for skin tone detection.
Proceedings of the International Conference on Image Processing, 2009

2008
Investigating the human computer interaction problems with automated teller machine navigation menus.
Interact. Technol. Smart Educ., 2008

A multilingual mobile university information portal designed to cater for visiting overseas students.
Interact. Technol. Smart Educ., 2008

Pinpointing users with location estimation techniques and Wi-Fi hotspot technology.
Int. J. Netw. Manag., 2008

Autonomic Vehicles.
Comput. Inf. Sci., 2008

Investigating the Human Computer Interaction Problems with Automated Teller Machine (ATM) Navigation Menus.
Comput. Inf. Sci., 2008

Disruption Tolerant Networking.
Comput. Inf. Sci., 2008

Image Analysis for Online Dynamic Steganography Detection.
Comput. Inf. Sci., 2008

Cognitive Radio.
Comput. Inf. Sci., 2008

A formal logic approach to firewall packet filtering analysis and generation.
Artif. Intell. Rev., 2008

Artificial intelligence and networking.
Artif. Intell. Rev., 2008

Utilizing Concept Drift for Pervasive Supervision.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

Skin tone based Steganography in video files exploiting the YCbCr colour space.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Combating digital document forgery using new secure information hiding algorithm.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Securing information content using new encryption method and Steganography.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Biometric Inspired Digital Image Steganography.
Proceedings of the 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March, 2008

Enhancing Steganography in Digital Images.
Proceedings of the Fifth Canadian Conference on Computer and Robot Vision, 2008

Autonomous Querying for Knowledge Networks.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
A primer on radio frequency identification for libraries.
Libr. Hi Tech, 2007

Taking the information to the public through Library 2.0.
Libr. Hi Tech, 2007

TeleMorph: A Fuzzy Logic Approach to Network-Aware Transmoding in Mobile Intelligent Multimedia Presentation Systems.
J. Sel. Topics Signal Processing, 2007

Wireless Handheld Devices Become Trusted Network Devices.
Inf. Secur. J. A Glob. Perspect., 2007

Challenges and research directions in autonomic communications.
Int. J. Internet Protoc. Technol., 2007

Addressing the Problems of Detecting Faces with Neural Networks.
Int. J. Image Graph., 2007

Geographical Mashups.
IEEE Distributed Syst. Online, 2007

Investigating the problems faced by older adults and people with disabilities in online environments.
Behav. Inf. Technol., 2007

Utilizing Stigmergy in Support of Autonomic Principles.
Proceedings of the Third International Conference on Semantics, 2007

Knowledge-Based Reasoning Through Stigmergic Linking.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

Autonomic Supervision of Stigmergic Self-Organisation for Distributed Information Retrieval.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

2006
Discovering Resources in Computational GRID Environments.
J. Supercomput., 2006

Investigating text input methods for mobile phones.
Telematics Informatics, 2006

An evaluation of image based steganography methods using visual inspection and automated detection techniques.
Multim. Tools Appl., 2006

An evaluation of image based steganography methods.
Multim. Tools Appl., 2006

Expressing emotion in electronic mail.
Kybernetes, 2006

Delivering Audio and Video with Rich Site Summary Enclosures.
J. Multim., 2006

Towards Self-Organizing Knowledge Networks for Smart World Infrastructures.
Int. Trans. Syst. Sci. Appl., 2006

Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks.
Inf. Secur. J. A Glob. Perspect., 2006

Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution.
Inf. Secur. J. A Glob. Perspect., 2006

Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures.
Inf. Manag. Comput. Secur., 2006

Resource discovery and management in computational GRID environments.
Int. J. Commun. Syst., 2006

Intelligent information retrieval.
Int. J. Adv. Media Commun., 2006

Bandwidth determined transmoding through fuzzy logic in mobile intelligent multimedia presentation systems.
Artif. Intell. Rev., 2006

Introducing a light-weight autonomic network middleware based on stigmergic mechanisms.
Ann. des Télécommunications, 2006

A location based wireless tourist guide.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Automated broadcast media monitoring using the google API.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

MPEG-7 Content-Based Descriptor Audio Applications.
Proceedings of the Advances in Intelligent IT, 2006

Intelligent Decision Making with the Semantic Web.
Proceedings of the Advances in Intelligent IT, 2006

Location Based Predictive Handoff Algorithm for Mobile Networks.
Proceedings of the Advances in Intelligent IT, 2006

2005
The Deployment of Protocol Stack Components Using Web Services.
Int. J. Web Serv. Res., 2005

Monitoring hacker activity with a Honeynet.
Int. J. Netw. Manag., 2005

Understanding and reducing web delays.
Int. J. Netw. Manag., 2005

Transcoding media for bandwidth constrained mobile devices.
Int. J. Netw. Manag., 2005

Examining the effects of caching, compression and popup filtering on internet surfing.
Int. J. Commun. Syst., 2005

Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks.
Int. J. Bus. Data Commun. Netw., 2005

Addressing Spam E-Mail Using Hashcast.
Int. J. Bus. Data Commun. Netw., 2005

An Investigation into Factors Associated with Web Page Download Delay.
Int. J. Bus. Data Commun. Netw., 2005

Knowledge Networks.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005

Online Gaming.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

2004
Dynamic reconfiguration of IP domain middleware stacks to support multicast multimedia distribution in a heterogeneous environment.
PhD thesis, 2004

TeleMorph: Bandwidth-Determined Mobile Multimodal Presentation.
J. Inf. Technol. Tour., 2004

A Year in the Life of the Irish Honeynet: Attacked, Probed and Bruised but Still Fighting.
Inf. Knowl. Syst. Manag., 2004

Mobile MultiModal presentation.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

Design of a Tourist Driven Bandwidth Determined MultiModal Mobile Presentation System.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Introducing IP Domain Flexible Middleware Stacks for Multicast Multimedia Distribution in Heterogeneous Environments.
Proceedings of the Mobility Aware Technologies and Applications, 2004

A Bandwidth Determined Mobile Multimodal System.
Proceedings of the ICETE 2004, 2004

Hacker Activity on the Irish Honeynet.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

An investigation into contributing factors in Web page download delays.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

Dynamic Discovery of Available Resources in Computational Grid Environments.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

2003
An End to End Adaptable Architecture for Streaming Media over IP Networks.
Multim. Tools Appl., 2003

The effects of badly behaved routers on Internet congestion.
Int. J. Netw. Manag., 2003

Web Intelligence in Information Retrieval.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

A middleware architecture for streaming media over IP networks to mobile devices.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Introducing Song Form Intelligence Into Streaming Audio.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

2002
A decision support system for telecommunications.
Int. J. Netw. Manag., 2002

A framework for the transmission of streaming media to mobile devices.
Int. J. Netw. Manag., 2002

A Web-Based Collaboration Teaching Environment.
IEEE Multim., 2002

An Online Collaboration Environment.
Educ. Inf. Technol., 2002

2001
Minimizing the Handoff Latency in Ad-Hoc Networks When Streaming Media to Mobile Devices.
Int. J. Wirel. Inf. Networks, 2001

Active Proxies for Streaming Media to Mobile Devices.
Proceedings of the ICEIS 2001, 2001

2000
A Legal Retrieval Information System.
J. Inf. Law Technol., 2000

Web Enabled Legal Aid.
Inf. Knowl. Syst. Manag., 2000

Helpmate: A Multimedia Web Teaching Framework.
First Monday, 2000

A Paradigm Shift in the Distribution of Multimedia.
Commun. ACM, 2000

Decision Support Systems within Telecommunications.
Proceedings of the ICEIS 2000, 2000

1999
Multiple multicast groups for multimedia on the Internet.
Inf. Softw. Technol., 1999

1998
Dynamic multimedia protocol stacks.
Softw. Concepts Tools, 1998

Optimal multimedia transport on the Internet.
J. Netw. Comput. Appl., 1998

Reliable remote isochronous applications over the Internet.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998


  Loading...