Professor Kevin Curran
Professor Kevin Curran
Professor in Cyber Security at Ulster University
Verified email at - Homepage
Cited by
Cited by
Digital image steganography: Survey and analysis of current methods
A Cheddad, J Condell, K Curran, P Mc Kevitt
Signal processing 90 (3), 727-752, 2010
Understanding the Internet
K Curran
Chandos Publishing 1, 350, 2009
A survey of active and passive indoor localisation systems
G Deak, K Curran, J Condell
Computer Communications 35 (16), 1939-1954, 2012
An evaluation of image based steganography methods
K Bailey, K Curran
Multimedia Tools and Applications 30, 55-88, 2006
Cloud computing security
S Carlin, K Curran
Pervasive and ubiquitous technology innovations for ambient intelligence …, 2013
A novel AI-enabled framework to diagnose coronavirus COVID-19 using smartphone embedded sensors: design study
HS Maghded, KZ Ghafoor, AS Sadiq, K Curran, DB Rawat, K Rabie
2020 IEEE 21st international conference on information reuse and integration …, 2020
An evaluation of indoor location determination technologies
K Curran, E Furey, T Lunney, J Santos, D Woods, A McCaughey
Journal of Location Based Services 5 (2), 61-78, 2011
A survey of geographical routing in wireless ad-hoc networks
F Cadger, K Curran, J Santos, S Moffett
IEEE Communications Surveys & Tutorials 15 (2), 621-653, 2012
Advertising on facebook
K Curran, S Graham, C Temple
International Journal of E-business development 1 (1), 26-33, 2011
Context-aware intelligent recommendation system for tourism
K Meehan, T Lunney, K Curran, A McCaughey
2013 IEEE international conference on pervasive computing and communications …, 2013
MI Malik, SH Wani, A Rashid
International Journal of Advanced Research in Computer Science 9 (2), 2018
A skin tone detection algorithm for an adaptive approach to steganography
A Cheddad, J Condell, K Curran, P Mc Kevitt
signal processing 89 (12), 2465-2478, 2009
Near field communication
K Curran, A Millar, C Mc Garvey
International Journal of Electrical and Computer Engineering 2 (3), 371, 2012
An overview of steganography techniques applied to the protection of biometric data
M Douglas, K Bailey, M Leeney, K Curran
Multimedia Tools and Applications 77 (13), 17333-17373, 2018
A hash-based image encryption algorithm
A Cheddad, J Condell, K Curran, P McKevitt
Optics communications 283 (6), 879-893, 2010
Taking the information to the public through Library 2.0
K Curran, M Murray, M Christian
Library hi tech 25 (2), 288-297, 2007
Biometric inspired digital image steganography
A Cheddad, J Condell, K Curran, P Mc Kevitt
15th Annual IEEE International Conference and Workshop on the Engineering of …, 2008
A dynamic threshold approach for skin segmentation in color images
P Yogarajah, J Condell, K Curran, A Cheddad, P McKevitt
2010 IEEE International Conference on Image Processing, 2225-2228, 2010
Social networking in education
N McCarroll, K Curran
International Journal of Innovation in the Digital Economy (IJIDE) 4 (1), 1-15, 2013
A secure and improved self-embedding algorithm to combat digital document forgery
A Cheddad, J Condell, K Curran, P Mc Kevitt
Signal Processing 89 (12), 2324-2332, 2009
The system can't perform the operation now. Try again later.
Articles 1–20