
Kevin CurranUniversity of Ulster · School of Computing and Intelligent Systems
Kevin Curran
BSc in Computer Science, PhD
About
583
Publications
488,390
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,321
Citations
Introduction
Kevin Curran is a Professor of Cyber Security, Executive Co-Director of the Legal innovation Centre at Ulster University. He sits on the UK Border Vision Advisory Group and the Northern Ireland Civil Service Cyber Leadership Board. He is also a senior member of the IEEE and is a regular technology contributor to TV, radio, trade and consumer IT magazines. He is one of the most interviewed technology experts in the UK with over 2000+ interviews in recent years https://kevincurran.org/interviews/.
Additional affiliations
June 1999 - present
Publications
Publications (583)
p>In the ever-evolving landscape of cyber threats, the integration of Artificial Intelligence (AI) has become popular into safeguarding digital assets and sensitive information for organisations throughout the world. This evolution of technology has given rise to a proliferation of cyber threats, necessitating robust cybersecurity measures. Traditi...
Energy costs are a concern, given the rate of increase in energy costs. The unprecedented switch to electricity as a source of energy is reflected in the growth of the electric vehicle, solar pv panel and heat pump markets as consumers compete with reducing fossil energy consumption. This paper evaluates electricity usage in two households, namely...
Anomaly detection in time series data is a complex data mining issue with many useful, real-world applications. Anomalies in datasets represent deviations in the expected behaviour of a system and can indicate rare but significant events that require intervention. Market manipulation is a serious issue in financial jurisdictions worldwide, with fin...
Anomaly detection in time series data is a complex issue in data mining that has many useful, real-world applications. Anomalies in datasets represent deviations in the expected behaviour of a system and can indicate rare but significant events that require intervention. Market manipulation is a serious issue in financial jurisdictions around the w...
Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development...
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how it treats them. Insight into these critical areas for a business will aid in the development of a robust customer experience strategy and in turn drive loyalty and recommend...
Data gloves capable of measuring finger joint kinematics can provide objective range of motion information useful for clinical hand assessment and rehabilitation. Data glove sensors are strategically placed over specific finger joints to detect movement of the wearers’ hand. The construction of the sensors used in a data glove, the number of sensor...
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the acti...
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of issues which are technical, social, physical and organisational in nature because of the complex gathering of large population numbers in such a spatially limited area. This ra...
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff a...
Purpose
The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large...
Edited Book: Computational Intelligence for Medical Internet of Things (MIoT) Application Systems
Publication in "Series: Advances in ubiquitous sensing applications for healthcare", by Elsevier
Submission link: https://easychair.org/conferences/?conf=miot-21
Chapter Submission Deadline: November, 2021
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for the Digital Economy, Innovation and Cyber Security – Health in the Pandemic Era.
- The book is specifically dedicated to scientific and technological innovations developed during the pandemic era, and
- contributes to the discourse on health security innovat...
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for the Digital Economy, Innovation and Cyber Security – Health in the Pandemic Era.
- The book is specifically dedicated to scientific and technological innovations developed during the pandemic era, and
- contributes to the discourse on health security innovat...
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for Location-Based Service Technology - In the Experience Age.
- The book provides an overview of contemporary location-based service technology around the globe, and
- contributes to the discourse on using an open community approach and supporting local ecosyst...
This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation.
Scandals such as those at OPCW and Gatwick Airport have reinforce...
In the absence of specialized encryption hardware, cryptographic operations must be performed in main memory. As such, it is common place for cyber criminals to examine the content of main memory with a view to retrieving high-value data in plaintext form and/or the associated decryption key. In this paper, the author presents a number of simple me...
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and sto...
Multi-factor Authentication (MFA) often referred to as Two-factor Authentication (2FA), which is a subset of MFA, is the practice of implementing additional security methods on top of a standard username and password to help authenticate the identity of a user and increase the security of data. This chapter will investigate the problem with usernam...
Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information. In 2018, 75% of CEOs and board members considered cyber security and technology a...
Smart cities achieved digital transformation of patients’ health records through the use of new technology in IoT healthcare industry. Such technologies of using IoT and remote patient monitoring systems have become dramatically fundamental to reduce the movement of patients, and hence reducing the risk of spreading Covid-19 infection. The Ministry...
Capturi ng hand motions for hand function evaluations is essential in the medical field. For many allied health professionals, measuring joint range of motion (ROM) is an important skill. While the universal goniometer (UG) is the most used clinical tool for measuring joint ROM, developments in current sensor technology are providing clinicians wit...
Early detection of Rheumatoid Arthritis (RA) and other neurological conditions is vital for effective treatment. Existing methods of detecting RA rely on observation, questionnaires, and physical measurement, each with their own weaknesses. Pharmaceutical medications and procedures aim to reduce the debilitating effect, preventing the progression o...
On 25 May 2018, the General Data Protection Regulation (GDPR) Article 17, the Right to Erasure (“Right to be Forgotten”) came into force, making it vital for organisations to identify, locate and delete all Personally Identifiable Information (PII) where a valid request is received from a data subject to erase their PII and the contractual period h...
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices p...
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available information services. Security and proper authentication is critical in any online learning environment because any flaws can affect perceptions of its trustworthiness. Biom...
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments...
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide mask identities while using websites and web-services. Anonymising Proxies and/or VPNs act as an intermediary between a use...
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to dete...
Infrastructure-free Indoor Positioning Systems (IPS) are a relatively new advancement in the indoor localisation area. Traditionally, IPS's require a certain amount of dedicated infrastructure within a building to position a device accurately. There are now companies offering infrastructure-free IPS that claim they can obtain sub-metre accuracy. So...
Current world events have forced a sudden remote-working economy that many businesses were simply not prepared for. According to a Gartner survey of 229 human resources (HR) managers, 81% or more are working remotely, and 41% are likely to do so at least some of the time even once a return to normal working is permitted. This sudden rise in remote...
On 25 May 2018, the General Data Protection Regulation (GDPR)Article 17, the Right to Erasure (‘Right to be Forgotten’) came into force making it vital for organisations to identify, locate and delete all Personally Identifiable Information (PII) where a valid request is received from a data subject to erase their PII and the contractual period has...
Denial of service (DoS) attack continues to pose a huge risk to online businesses. The attack has moved from attack at the network level – layer 3 and layer 4 to the layer 7 of the OSI model. This layer 7 attack or application layer attack is not easily detectable by firewalls and most intrusion Detection systems and other security tools but have t...
Image segmentation plays a crucial role in many image processing and understanding applications. Despite the huge number of proposed image segmentation techniques, accurate segmentation remains a significant challenge in image analysis. This article investigates the viability of using echo state network (ESN), a biologically inspired recurrent neur...
Coronaviruses are a famous family of viruses that causes illness in human or animals. The new type of corona virus COVID-19 disease was firstly discovered in Wuhan-China. However, recently, the virus has been widely spread in most of the world countries and is reported as a pandemic. Further, nowadays, all the world countries are striving to contro...
Blockchain technology is still in its infancy, but the capacity to overcome the requirement for third parties to operate as a level of trust is one of its strengths. A review of the literature found that the link between implementation areas and business opportunities for blockchain technology was superficially covered (Vitsø et al., 2017). This wo...
The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter the zone transfer attack via the generation of DNSSEC keys on the name servers which prevent attackers from obtaining a full zone transfer as its request for the transfer...
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff a...
People are interacting increasingly with systems through voice assistants and chatbots sectors such as banking and financial are adopting them to create more responsive customer services. This project aimed to implement a web-based chatbot to assist with online banking, using tools that expose artificial intelligence methods such as natural languag...
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how it treats them. Insight into these critical areas for a business will aid in the development of a robust customer experience strategy and in turn drive loyalty and recommend...
The aim of this study was to evaluate the usage of a reminiscence app by people living with dementia and their family carers, by comparing event log data generated from app usage alongside the qualitative experience of the process. A cross-comparative analysis of electronic event logging data with qualitative interview data was conducted. Electroni...
This report provides an in-depth analysis of the complex data issues involved in digital music content. Commissioned by the UK Intellectual Property Office (IPO) and sponsored by the two key UK music collection societies, PRS for Music and PPL, this report reveals stumbling blocks the music industry should face in order to tap into the full potenti...
Smartphones are becoming increasingly pervasive in almost every aspect of daily life. With smartphones being equipped with multiple sensors, they provide an opportunity to automatically extract information relating to daily life. Information relating to daily life could have major benefits in the area of health informatics. Research shows that ther...
2520
Background: Autologous chimeric antigen receptor (CAR) T cell therapy has shown to be effective in CD19+ relapsed or refractory (R/R) B-ALL but requires a 2-4 week period of cell processing and manufacture. During this “bridging period,” patients are vulnerable to disease progression and complications. We sought to characterize bridging strate...
Tracking people indoors can be valuable in smart living scenarios such as tracking shoppers in a mall or in healthcare situations when tracking the movement of elderly patients can allow them to remain more independent. Determining accurate movement of people indoors is problematic however as there is no universal tracking system such as GPS which...
With smart-devices becoming increasingly more commonplace, methods of capturing an individual's activities are becoming feasible. This is more generally performed through questionnaires or within unnatural environments bringing drawbacks in accuracy or requiring impractical conditions. This paper presents a simpler method of data collection which r...
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the acti...
Quantifying individual’s levels of activity through smart or proprietary devices is currently an active area of research. Current implementations use subjective methods, for instance, questionnaires or require comprehensively annotated datasets for automated classification. Each method brings its own specific drawbacks. Questionnaires cause recall...
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment camps for young people have sprung up around in a bid to address this contemporary issue. This chapter examines the factors in Internet addiction, its definition, the compl...
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available information services. Security and proper authentication is critical in any online learning environment because any flaws can affect perceptions of its trustworthiness. Biom...
The potential for technology to support memory or enhance cognition for people living with dementia is currently an area of significant interest. The use of digital systems to facilitate reminiscing has been shown to be beneficial for people living with dementia. This paper reports on a study that examines the value of several common usability test...
Drones, also referred to as UAV's (Unmanned Aerial Vehicle), are an aircraft without a human pilot. Drones have been used by various military organisations for over a decade, but in recent years drones a have been emerging more and more in commercial and recreational capacity. The paper is aimed at drone and UAV technology capabilities and how they...
Internet addiction (IA) is typically defined as a condition where an individual has lost control of their internet use and proceeds to use the internet excessively to the point where he/she experiences problematic consequences which ultimately have a negative effect on his/her life. The authors examine what constitutes an addiction, the definition...
Mobile technology today is increasingly being used to help improve underdeveloped and developing areas such as Sub-Saharan Africa. With the statistics showing the number of adults in Africa owning mobile devices steadily increasing, mobile technology has been a popular area of interest to use to help improve areas such as healthcare and education t...
Recent studies have focused on the use of technology to support reminiscence but there remains a dearth of research on the health costs and benefits associated with this intervention. The aim of this study was to estimate costs and quality of life associated with a home based, individual specific reminiscence intervention, facilitated by an iPad ap...
Building a secure electronic voting system is a difficult task. The US Pentagon dropped their proposed online voting system which would have given overseas military personnel the opportunity to vote in the elections in 2005, citing the inability to ensure the legitimacy of votes as the reason. There is however a new cry in the wild to deploy a voti...
Electricity markets are different from other markets as electricity generation cannot be easily stored in substantial amounts and to avoid blackouts, the generation of electricity must be balanced with customer demand for it on a second-by-second basis. Customers tend to rely on electricity for day-to-day living and cannot replace it easily so when...
The aim of this qualitative study was to explore the impact of a home-based, personalised reminiscence programme facilitated through an iPad app on people living with dementia and their family carers. Semi-structured interviews were used to collect data from 15 people living with dementia and 17 family carers from a region of the United Kingdom. Th...
It gives me great pleasure to invite you to contribute to the inaugural edition of the JBBA - Journal of the British Blockchain Association. The JBBA is Europe’s first peer reviewed, academic journal devoted to Blockchain & other Distributed Ledger Technologies and Cryptocurrencies. Peer-review is a critical part of the functioning of the scientifi...
Identification of persons by way of biometric features is an emerging phenomenon. Over the years, biometric recognition has received much attention due to its need for security. Amongst the many existing biometrics, fingerprints are considered to be one of the most practical ones. Techniques such as watermarking and steganography have been used in...
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of issues which are technical, social, physical and organisational in nature because of the complex gathering of large population numbers in such a spatially limited area. This ra...
There has been a growth in popularity of privacy in the personal computing space and this has influenced the IT industry. There is more demand for websites to use more secure and privacy focused technologies such as HTTPS and TLS. This has had a knock-on effect of increasing the popularity of Virtual Private Networks (VPNs). There are now more VPN...
Vehicular accidents are a major global problem, leading to human injury, damages to property, financial losses and other negative impacts on the general public. In most cases, vehicular accidents are caused by avoidable human error and improper driving practices. With recent advances in sensing technologies, self-driving, connected cars and autonom...
Determining the location of individuals within indoor locations can be useful in various scenarios including security, gaming and ambient assisted living for the elderly. Healthcare services globally are seeking to allow people to stay in their familiar home environments longer due to the multitude of benefits associated with living in non-clinical...
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices p...
The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical...
Location-aware services enable location intelligence which provides many benefits such as personalisation of communications, consumer analytics, locating a fireman in a burning building or classifying daily activities in the home among numerous other services. Active localisation technology is where a person carries a device such as a phone or beac...
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment camps for young people have sprung up around in a bid to address this contemporary issue. This chapter examines the factors in Internet addiction, its definition, the compl...