Kevin Curran

Kevin CurranKevin Curran BSc (Hons), PhD, SMIEEE, MBCS CITP, MACM, MIEE, FHEA has made significant contributions to advancing the knowledge and understanding of computer networking, evidenced by over 350 publications. He is a regular contributor to BBC radio & TV news in Northern Ireland and is listed in the Dictionary of International Biography, Marquis Who’s Who in Science and Engineering and by Who’s Who in the World. He has chaired sessions and participated in the organising committees for many highly-respected international conferences and workshops. He is on the editorial boards of a number of journals and he is Editor in Chief of the International Journal of Ambient Computing and Intelligence. Dr Curran has also served as an advisor to the British Computer Society in regard to computer industry standards.

Publications

The Role of Education and Awareness in Tackling Insider Threats
Shaun Joseph Smyth, Kevin Curran, Nigel McKelvey. © 2022. 20 pages.
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their...
Smart Cities, Smart Grids, and Smart Grid Analytics: How to Solve an Urban Problem
Shaun Joseph Smyth, Kevin Curran, Nigel McKelvey. © 2022. 27 pages.
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of...
Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network
Alban Scribbins, Kevin Curran. © 2022. 29 pages.
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive...
The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying
Conor Gallagher, Eoghan Furey, Kevin Curran. © 2022. 30 pages.
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how...
How Mobile Technologies Are Leading to Economic Development in Sub-Saharan Africa
Nigel McKelvey, Adam Crossan, Kevin Curran. © 2021. 8 pages.
Mobile technology today is increasingly being used to help improve underdeveloped and developing areas such as sub-Saharan Africa. With the statistics showing the number of...
A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification: Resource-Limited Device Authentication
Piotr Ksiazak, William Farrelly, Kevin Curran. © 2021. 45 pages.
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that...
Biometric Authentication Techniques in Online Learning Environments
Jack Curran, Kevin Curran. © 2021. 13 pages.
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available...
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
Shane Miller, Kevin Curran, Tom Lunney. © 2021. 20 pages.
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising...
Wireless Interference Analysis for Home IoT Security Vulnerability Detection
Alexander McDaid, Eoghan Furey, Kevin Curran. © 2021. 23 pages.
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of...
Detection of Anonymising Proxies Using Machine Learning
Shane Miller, Kevin Curran, Tom Lunney. © 2021. 17 pages.
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst...
Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network
Alban Scribbins, Kevin Curran. © 2020. 26 pages.
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive...
A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC
Israr Khan, William Farrelly, Kevin Curran. © 2020. 23 pages.
The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter...
Detection of Virtual Private Network Traffic Using Machine Learning
Shane Miller, Kevin Curran, Tom Lunney. © 2020. 21 pages.
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising...
Mobile Technologies Impact on Economic Development in Sub-Saharan Africa
Adam Crossan, Nigel McKelvey, Kevin Curran. © 2019. 9 pages.
Mobile technology today is increasingly being used to help improve underdeveloped and developing areas such as Sub-Saharan Africa. With the statistics showing the number of...
Internet Addiction: A Modern Societal Problem
Shaun Joseph Smyth, Kevin Curran, Nigel Mc Kelvey. © 2019. 24 pages.
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment...
Biometric Authentication Techniques in Online Learning Environments
Jack Curran, Kevin Curran. © 2019. 13 pages.
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available...
The Role of Education and Awareness in Tackling Insider Threats
Shaun Joseph Smyth, Kevin Curran, Nigel McKelvey. © 2019. 20 pages.
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their...
Drones and Privacy
Nigel McKelvey, Cathal Diver, Kevin Curran. © 2019. 15 pages.
Drones, also referred to as UAV's (Unmanned Aerial Vehicle), are an aircraft without a human pilot. Drones have been used by various military organisations for over a decade...
Internet Addiction: The Repercussions, the Causes, and the Treatment
Shaun Joseph Smyth, Kevin Curran, Nigel McKelvey. © 2019. 19 pages.
Internet addiction (IA) is typically defined as a condition where an individual has lost control of their internet use and proceeds to use the internet excessively to the point...
The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying
Conor Gallagher, Eoghan Furey, Kevin Curran. © 2019. 27 pages.
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how...
Mobile Technologies Impact on Economic Development in Sub-Saharan Africa
Adam Crossan, Nigel McKelvey, Kevin Curran. © 2018. 7 pages.
Mobile technology today is increasingly being used to help improve under developed and developing areas such as sub Saharan Africa. With the statistics showing the number of...
Common Problems Faced When Developing Applications for Mobile Devices
Kevin Curran, Sean Carlin, Joseph McMahon. © 2018. 17 pages.
Mobile application development is relatively new and has seen growth of late. With this rapid expansion, there are growing pains within industry, as the usual time given to the...
Internet Addiction: A Modern Societal Problem
Shaun Joseph Smyth, Kevin Curran, Nigel Mc Kelvey. © 2018. 24 pages.
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment...
A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification: Resource-Limited Device Authentication
Piotr Ksiazak, William Farrelly, Kevin Curran. © 2018. 46 pages.
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that...
Designing a Compact Wireless Network Based Device-Free Passive Localisation System for Indoor Environments
Philip Vance, Girijesh Prasad, Jim Harkin, Kevin Curran. © 2018. 16 pages.
Determining the location of individuals within indoor locations can be useful in various scenarios including security, gaming and ambient assisted living for the elderly....
Smart Cities, Smart Grids, and Smart Grid Analytics: How to Solve an Urban Problem
Shaun Joseph Smyth, Kevin Curran, Nigel McKelvey. © 2018. 35 pages.
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of...
Using Leap Motion and Gamification to Facilitate and Encourage Rehabilitation for Hand Injuries: Leap Motion for Rehabilitation
Jamie Taylor, Kevin Curran. © 2016. 10 pages.
Injuries to the hand are more common than those of any other body region and can have considerable financial, time-measured and psychological impact on not only the victim but...
The Challenges of Data Cleansing with Data Warehouses
Nigel McKelvey, Kevin Curran, Luke Toland. © 2016. 6 pages.
Data cleansing is a long standing problem which every organisation that incorporates a form of data processing or data mining must undertake. It is essential in improving the...
Recent Advances in Ambient Intelligence and Context-Aware Computing
Kevin Curran. © 2015. 375 pages.
Modern devices, from phones and cars to houses and the appliances within them, are being designed with formidable computational power and expanded functionality. To be truly...
Cloud Computing
Gavin O'Donnell, Nigel McKelvey, Kevin Curran. © 2015. 6 pages.
Internet Censorship in China
Treasa Nic Giolla Chomhaill, Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 5 pages.
Software Piracy
Martin Harran, Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 6 pages.
Context Awareness in Mobile Devices
Donna Moen, Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 6 pages.
Mobile App Stores
Michael Curran, Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 7 pages.
The Internet of Things
Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 7 pages.
The Rise of the Tablet
Paul O'Donnell, Nigel McKelvey, Kevin Curran, Nadarajah Subaginy. © 2015. 6 pages.
Glove-Based Technology in Hand Rehabilitation
Jamie Taylor, Kevin Curran. © 2015. 21 pages.
Injuries to the hand are more common than those of any other body region and can have considerable financial, time-measured and psychological impact on not only the victim but...
A Camera-Based System for Determining Hand Range of Movement Measurements in Rheumatoid Arthritis
Aaron Bond, Kevin Curran. © 2015. 21 pages.
Rheumatoid arthritis affects around 1% of the world's population. Detection of the disease relies heavily on observation by physicians. The effectiveness of these kinds of...
Developing Team Work in IT Education to Foster Student Engagement
Nigel McKelvey, Kevin Curran. © 2015. 11 pages.
Teamwork is an important aspect that should be provided by both employers and employees. This chapter proposes relating this ethos to an educational environment in order to...
Common Problems Faced When Developing Applications for Mobile Devices
Kevin Curran, Sean Carlin, Joseph McMahon. © 2015. 17 pages.
Mobile application development is relatively new and has seen growth of late. With this rapid expansion, there are growing pains within industry, as the usual time given to the...
A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
Niall McCarroll, Kevin Curran. © 2015. 21 pages.
The Northern Ireland pre-school curriculum promotes educational development through enabling learning environments and active learning through play and exploration. Enabling...
A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
Niall McCarroll, Kevin Curran. © 2015. 21 pages.
The Northern Ireland pre-school curriculum promotes educational development through enabling learning environments and active learning through play and exploration. Enabling...
Glove-Based Technology in Hand Rehabilitation
Jamie Taylor, Kevin Curran. © 2015. 20 pages.
Injuries to the hand are more common than those of any other body region and can have considerable financial, time-measured and psychological impact on not only the victim but...
An Active Low Cost Mesh Networking Indoor Tracking System
Sean Carlin, Kevin Curran. © 2014. 35 pages.
Indoor radio frequency tracking systems are generally quite expensive and can vary in accuracy due to interference, equipment quality or other environmental factors. Due to these...
Social Networking in Education
Niall McCarroll, Kevin Curran. © 2014. 15 pages.
Social networking has become one of the most popular communication tools to have evolved over the past decade, making it a powerful new information sharing resource in society....
Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
Kevin Curran. © 2013. 316 pages.
Ambient intelligence began as a vision for the future of technology and has now become a reality. The widespread use of modern technology has quickly expanded into the use of our...
Cheating in Exams with Technology
Kevin Curran, Gary Middleton, Ciaran Doherty. © 2013. 9 pages.
Traditional methods of detection may no longer be wholly successful in fully preventing cheating in examinations. New strategies need to be considered and employed to better...
HTML5
Kevin Curran, Kevin Deery. © 2013. 6 pages.
HTML5 is a standard for structuring and presenting content on the web with a particular emphasis on the mobile web. It can be seen as a collection of individual features that...
Location-Based Social Networks
Declan Traynor, Kevin Curran. © 2013. 11 pages.
The ability to gather and manipulate real world contextual data, such as user location, in modern software systems presents opportunities for new and exciting application areas....
Cloud Computing Security
Sean Carlin, Kevin Curran. © 2013. 6 pages.
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on...
The Role of Augmented Reality within Ambient Intelligence
Kevin Curran, Denis McFadden, Ryan Devlin. © 2013. 16 pages.
An Augmented Reality (AR) is a technology which provides the user with a real time 3D enhanced perception of a physical environment with addition virtual elements—either virtual...
The Problems of Jurisdiction on the Internet
Róisín Lautman, Kevin Curran. © 2013. 7 pages.
The relationship between jurisdiction and the internet has been the subject of wide ranging discussion ever since the boom in domestic internet usage. Without clear legislation...
The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
Stephen O’Neill, Kevin Curran. © 2013. 9 pages.
Search engine optimization (SEO) is the process of improving the visibility, volume and quality of traffic to website or a web page in search engines via the natural search...
OpenStreetMap
Kevin Curran, John Crumlish, Gavin Fisher. © 2013. 10 pages.
OpenStreetMap is a collaborative web-mapping project that collects geospatial data to create and distribute online maps, freely available to anyone with an Internet connection....
The Role of Twitter in the World of Business
Kevin Curran, Kevin O’Hara, Sean O’Brien. © 2013. 16 pages.
This paper examines the services people seek out on Twitter and the integration of Twitter into businesses. Twitter has experienced tremendous growth in users over the past few...
Social Networking in Education
Niall McCarroll, Kevin Curran. © 2013. 15 pages.
Social networking has become one of the most popular communication tools to have evolved over the past decade, making it a powerful new information sharing resource in society....
Social Networking and Health
Kevin Curran, Michael Mc Hugh. © 2013. 10 pages.
The rise of social networking has revolutionised how people communicate on a daily basis. In a world where more people are connecting to the internet, social networking services...
Innovative Applications of Ambient Intelligence: Advances in Smart Systems
Kevin Curran. © 2012. 332 pages.
While ambient intelligence has long been relegated to the realm of science fiction, creating smart technology that is increasingly responsive to individuals and environments is...
Context-Awareness in Ambient Intelligence
Declan Traynor, Ermai Xie, Kevin Curran. © 2012. 11 pages.
Ambient Intelligence (AmI) deals with the issue of how we can create context-aware, electronic environments which foster seamless human-computer interaction. Ambient Intelligence...
Ambient Interface Design (AID) for the Ergonomically Challenged
Rosaleen Hegarty, Tom Lunney, Kevin Curran, Maurice Mulvenna. © 2012. 8 pages.
Mobile devices offer convenient communication capabilities and have the potential to create intermediary support for ergonomically challenged users. With the global proliferation...
An Activity Monitoring Application for Windows Mobile Devices
Hayat Al Mushcab, Kevin Curran, Jonathan Doherty. © 2012. 18 pages.
Obesity is rising at an alarming rate. A great challenge facing the health community is introducing population-wide approaches to weight management as existing health and medical...
Man in the Browser Attacks
Timothy Dougan, Kevin Curran. © 2012. 11 pages.
Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security...
Security Issues in Cloud Computing
Kevin Curran, Sean Carlin, Mervyn Adams. © 2012. 9 pages.
Cloud Computing is a distributed architecture that centralizes server resources on a scalable platform so as to provide on demand computing resources and services. Cloud...
HTML5 and the Mobile Web
Kevin Curran, Aaron Bond, Gavin Fisher. © 2012. 17 pages.
Accessing the Web from mobile devices is a popular practice. Trends show that the mobile space is becoming the method through which many consumers access content – both through...
Mobile Phone Forensic Analysis
Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy. © 2012. 13 pages.
During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of...
OpenStreetMap
Kevin Curran, John Crumlish, Gavin Fisher. © 2012. 10 pages.
OpenStreetMap is a collaborative web-mapping project that collects geospatial data to create and distribute online maps, freely available to anyone with an Internet connection....
Recent Developments in Simplified Sign-On
Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher. © 2011. 11 pages.
Authentication is the process of determining whether a user is to be granted access and verifying that they are whom they claim to be. This is generally done via a login system;...
Ubiquitous Developments in Ambient Computing and Intelligence: Human-Centered Applications
Kevin Curran. © 2011. 402 pages.
Ambient Intelligence (AmI) is an emerging paradigm for knowledge discovery, which originally emerged as a design language for invisible computing and smart environments. Since...
Cloud Computing Security
Sean Carlin, Kevin Curran. © 2011. 6 pages.
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on...
Ambient Communication Experience (ACE), Information Interaction in Design Space
Rosaleen Hegarty, Tom Lunney, Kevin Curran, Maurice Mulvenna. © 2011. 8 pages.
A changing computing landscape is expected to sense the physical world yet remain concealed within its very infrastructure to provide virtual services which are discreetly...
Proactive Context-Aware Middleware
Karen Lee, Tom Lunney, Kevin Curran, Jose Santos. © 2011. 9 pages.
Advancements in sensor technology, wireless communications and information technology has enabled the success of new types of dynamic computing systems. However designing systems...
RFID-Enabled Location Determination within Indoor Environments
Kevin Curran, Stephen Norrby. © 2011. 24 pages.
The ability to track the real-time location and movement of items or people offers a broad range of useful applications in areas such as safety, security and the supply chain....
The Role of Augmented Reality within Ambient Intelligence
Kevin Curran, Denis McFadden, Ryan Devlin. © 2011. 19 pages.
An Augmented Reality (AR) is a technology which provides the user with a real time 3D enhanced perception of a physical environment with addition virtual elements—either virtual...
Cheating in Exams with Technology
Kevin Curran, Gary Middleton, Ciaran Doherty. © 2011. 9 pages.
Traditional methods of detection may no longer be wholly successful in fully preventing cheating in examinations. New strategies need to be considered and employed to better...
The Problems of Jurisdiction on the Internet
Kevin Curran, Róisín Lautman. © 2011. 7 pages.
The relationship between jurisdiction and the internet has been the subject of wide ranging discussion ever since the boom in domestic internet usage. Without clear legislation...
The Role of Twitter in the World of Business
Kevin Curran, Kevin O’Hara, Sean O’Brien. © 2011. 15 pages.
This paper examines the services people seek out on Twitter and the integration of Twitter into businesses. Twitter has experienced tremendous growth in users over the past few...
The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
Stephen O’Neill, Kevin Curran. © 2011. 9 pages.
Search engine optimization (SEO) is the process of improving the visibility, volume and quality of traffic to website or a web page in search engines via the natural search...
Social Networking
Kevin Curran, Paul O’Kane, Ryan McGinley, Owen Kelly. © 2010. 13 pages.
It is in man’s nature to form communities, and it is also in his nature to communicate. Psychologists hold that man is moved by instincts, desires which can only find full...
Context-Awareness in Ambient Intelligence
Declan Traynor, Ermai Xie, Kevin Curran. © 2010. 11 pages.
Ambient Intelligence (AmI) deals with the issue of how we can create context-aware, electronic environments which foster seamless human-computer interaction. Ambient Intelligence...
Ambient Interface Design (AID) for the Ergonomically Challenged
Rosaleen Hegarty, Tom Lunney, Kevin Curran, Maurice Mulvenna. © 2010. 8 pages.
Mobile devices offer convenient communication capabilities and have the potential to create intermediary support for ergonomically challenged users. With the global proliferation...
An Activity Monitoring Application for Windows Mobile Devices
Hayat Al Mushcab, Kevin Curran, Jonathan Doherty. © 2010. 18 pages.
Obesity is rising at an alarming rate. A great challenge facing the health community is introducing population-wide approaches to weight management as existing health and medical...
Mobile Phone Forensic Analysis
Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy. © 2010. 13 pages.
During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of...
International Journal of Ambient Computing and Intelligence (IJACI)
Nilanjan Dey. Est. 2009.
In an ambient intelligence world, devices work in concert to support people in carrying out everyday life activities and tasks in a natural way using information and intelligence...
Ambient Communication Experience (ACE)
Rosaleen Hegarty, Tom Lunney, Kevin Curran, Maurice Mulvenna. © 2009. 6 pages.
Ambient Information Systems (AIS), permit a mode of expression that can easily exist at the level of subconscious realisation. Principles of cognition are usually aggregated...
Really Simple Syndication (RSS)
Kevin Curran, Sheila McCarthy. © 2009. 6 pages.
E-mail has been one of the major reasons for the broad acceptance of the Internet, and although e-mail is still a vitally important communication tool, it suffers from an...
Social Networking
Kevin Curran. © 2009. 11 pages.
It is in man’s nature to form communities, and it is also in his nature to communicate. Psychologists hold that man is moved by instincts, desires which can only find full...
SPIT: Spam Over Internet Telephony
Kevin Curran. © 2009. 6 pages.
Spam in the computer does not simply mean ads. Spam is any message, article, or ad that repeats itself an unacceptable number of times so that it causes annoyance. The content of...
The World of Podcasting, Screencasting, Blogging, and Videoblogging
Kevin Curran. © 2009. 7 pages.
A podcast is a Web feed containing audio or video files which is then placed on the Internet for anyone to download. What makes the podcast distinct from traditional media like...
Ambient Middleware for Context-Awareness (AMiCA)
Karen Lee, Tom Lunney, Kevin Curran, Jose Santos. © 2009. 13 pages.
Recent advances in wireless networking technologies and the growing success of mobile computing devices are enabling new classes of applications. Distributed applications running...
RFID-Enabled Location Determination Within Indoor Environments
Kevin Curran, Stephen Norrby. © 2009. 24 pages.
The ability to track the real-time location and movement of items or people offers a broad range of useful applications in areas such as safety, security and the supply chain....
Autonomic Computing
Kevin Curran, Maurice Mulvenna, Chris Nugent, Matthias Baumgarten. © 2008. 6 pages.
Modern networks offer end-to-end connectivity however; the increasing amount of traditional offered services may still not fulfill the requirements of ever demanding distributed...
Hackers, Hacking, and Eavesdropping
Kevin Curran, Peter Breslin, Kevin McLaughlin, Gary Tracey. © 2008. 6 pages.
"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function...
Multimedia for Mobile Devices
Kevin Curran. © 2008. 8 pages.
Mobile communications is a continually growing sector in industry and a wide variety of visual services such as video-on-demand have been created which are limited by...
Security Issues with Wi-Fi Networks
Kevin Curran, Elaine Smyth. © 2008. 7 pages.
On the surface, WLANs act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference...
The Semantic Web
Kevin Curran, Gary Gumbleton. © 2008. 7 pages.
Tim Berners-Lee, director of the World Wide Web Consortium (W3C), states that, “The Semantic Web is not a separate Web but an extension of the current one, in which information...
Web Services
Kevin Curran, Padraig O’Kane. © 2008. 6 pages.
The term “Web services” was initially employed by Bill Gates, chairman of Microsoft, at the Microsoft Professional Developers Conference in Orlando, Florida on July 12, 2000....
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
Kevin Curran, Elaine Smyth. © 2008. 24 pages.
This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network communications can be picked up outside the physical...
Multimedia for Mobile Devices
Kevin Curran. © 2008. 9 pages.
Mobile communications is a continually growing sector in industry and a wide variety of visual services such as video-on-demand have been created which are limited by...
Prevalent Factors Involved in Delays Associated with Page Downloads
Kevin Curran, Noel Broderick. © 2007. 13 pages.
Over the years the number of Web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each user’s surfing experience. A...
Addressing WiFi Security Concerns
Kevin Curran, Elaine Smyth. © 2007. 26 pages.
Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning a hacker can...
Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
Kevin Curran, John Honan. © 2007. 29 pages.
This chapter investigates the problem of e-mail spam, and identifies methods to minimize the volumes. The analysis focuses on the hashcash proof-of-work approach, and...
Cyber Terrorism Attacks
Kevin Curran, Kevin Concannon, Sean McKeever. © 2007. 6 pages.
Cyber terrorism is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against...
Cryptography
Kevin Curran, Niall Smyth, Bryan McGrory. © 2007. 8 pages.
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of...
Electronic Surveillance and Civil Rights
Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney. © 2007. 9 pages.
Modern technology is providing unprecedented opportunities for surveillance. Employers can read e-mail, snoop on employee’s computer files, and eavesdrop on their calls. Many...
Hacking and Eavesdropping
Kevin Curran, Peter Breslin, Kevin McLaughlin, Gary Tracey. © 2007. 11 pages.
Many self-proclaimed hackers would actually consider themselves to be performing a service to businesses as they claim they are simply showing businesses the flaws within their...
Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
Kevin Curran, Brendan Gallagher. © 2007. 22 pages.
Dynamic protocol stacks enable a developer to select a particular protocol profile at bind time where each protocol profile is built from a rich library of protocol modules...
Addressing Spam E-Mail Using Hashcast
Kevin Curran, John Stephen Honan. © 2005. 25 pages.
This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for...
An Investigation into Factors Associated with Web Page Download Delay
Kevin Curran, Noel Broderick. © 2005. 12 pages.
Since the Mosaic browser was introduced with its ability to display images, there has been a proliferation in the number of Web pages using a combination of text and image-heavy...
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
Kevin Curran, Elaine Smyth. © 2005. 25 pages.
This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network communications can be picked up outside the physical...
The Deployment of Protocol Stack Components Using Web Services
Kevin Curran, Brendan Gallagher. © 2005. 18 pages.
Multimedia has varying optimal transport methods. The traditional methods employed by transport protocols are to ship all data through identical protocol stacks. An ideal method...