Professor Kevin Curran
Professor Kevin Curran
Professor in Cyber Security at Ulster University
Verified email at - Homepage
Cited by
Cited by
Digital image steganography: Survey and analysis of current methods
A Cheddad, J Condell, K Curran, P Mc Kevitt
Signal processing 90 (3), 727-752, 2010
Understanding the Internet
K Curran
Chandos Publishing 1, 350, 2009
A survey of active and passive indoor localisation systems
G Deak, K Curran, J Condell
Computer Communications 35 (16), 1939-1954, 2012
Cloud computing security
S Carlin, K Curran
Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence …, 2013
A survey of geographical routing in wireless ad-hoc networks
F Cadger, K Curran, J Santos, S Moffett
IEEE Communications Surveys & Tutorials 15 (2), 621-653, 2012
An evaluation of indoor location determination technologies
K Curran, E Furey, T Lunney, J Santos, D Woods, A McCaughey
Journal of Location Based Services 5 (2), 61-78, 2011
An evaluation of image based steganography methods
K Bailey, K Curran
Multimedia Tools and Applications 30 (1), 55-88, 2006
An evaluation of image based steganography methods
K Curran, K Bailey
International Journal of Digital Evidence 2 (2), 1-40, 2003
A skin tone detection algorithm for an adaptive approach to steganography
A Cheddad, J Condell, K Curran, P Mc Kevitt
Signal Processing 89 (12), 2465-2478, 2009
Context-aware intelligent recommendation system for tourism
K Meehan, T Lunney, K Curran, A McCaughey
2013 IEEE international conference on pervasive computing and communications …, 2013
Advertising on Facebook
K Curran, S Graham, C Temple
International Journal of E-business development 1 (1), 26-33, 2011
Near Field Communication.
K Curran, A Millar, C Mc Garvey
International Journal of Electrical & Computer Engineering (2088-8708) 2 (3), 2012
A dynamic threshold approach for skin tone detection in colour images
P Yogarajah, J Condell, K Curran, P McKevitt, A Cheddad
International Journal of Biometrics 4 (1), 38-55, 2012
Taking the information to the public through Library 2.0
K Curran, M Murray, M Christian
Library hi tech, 2007
A hash-based image encryption algorithm
A Cheddad, J Condell, K Curran, P McKevitt
Optics communications 283 (6), 879-893, 2010
Biometric inspired digital image steganography
A Cheddad, J Condell, K Curran, P Mc Kevitt
15th Annual IEEE International Conference and Workshop on the Engineering of …, 2008
A secure and improved self-embedding algorithm to combat digital document forgery
A Cheddad, J Condell, K Curran, P Mc Kevitt
Signal Processing 89 (12), 2324-2332, 2009
Cloud computing technologies
S Carlin, K Curran
International Journal of Cloud Computing and Services Science 1 (2), 59, 2012
IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario
G Deak, K Curran, J Condell, E Asimakopoulou, N Bessis
Simulation Modelling Practice and Theory 35, 86-96, 2013
Investigating the problems faced by older adults and people with disabilities in online environments
K Curran, N Walters, D Robinson
Behaviour & Information Technology 26 (6), 447-453, 2007
The system can't perform the operation now. Try again later.
Articles 1–20