Kevin Curran

Kevin Curran
Verified
Kevin verified their affiliation via an institutional email.
Verified
Kevin verified their affiliation via an institutional email.
University of Ulster · School of Computing and Intelligent Systems

BSc in Computer Science, PhD

About

583
Publications
488,390
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,321
Citations
Introduction
Kevin Curran is a Professor of Cyber Security, Executive Co-Director of the Legal innovation Centre at Ulster University. He sits on the UK Border Vision Advisory Group and the Northern Ireland Civil Service Cyber Leadership Board. He is also a senior member of the IEEE and is a regular technology contributor to TV, radio, trade and consumer IT magazines. He is one of the most interviewed technology experts in the UK with over 2000+ interviews in recent years https://kevincurran.org/interviews/.
Additional affiliations
June 1999 - present
University of Ulster
Position
  • Reader in Computer Science

Publications

Publications (583)
Article
Full-text available
p>In the ever-evolving landscape of cyber threats, the integration of Artificial Intelligence (AI) has become popular into safeguarding digital assets and sensitive information for organisations throughout the world. This evolution of technology has given rise to a proliferation of cyber threats, necessitating robust cybersecurity measures. Traditi...
Article
Energy costs are a concern, given the rate of increase in energy costs. The unprecedented switch to electricity as a source of energy is reflected in the growth of the electric vehicle, solar pv panel and heat pump markets as consumers compete with reducing fossil energy consumption. This paper evaluates electricity usage in two households, namely...
Article
Full-text available
Anomaly detection in time series data is a complex data mining issue with many useful, real-world applications. Anomalies in datasets represent deviations in the expected behaviour of a system and can indicate rare but significant events that require intervention. Market manipulation is a serious issue in financial jurisdictions worldwide, with fin...
Article
Full-text available
Anomaly detection in time series data is a complex issue in data mining that has many useful, real-world applications. Anomalies in datasets represent deviations in the expected behaviour of a system and can indicate rare but significant events that require intervention. Market manipulation is a serious issue in financial jurisdictions around the w...
Article
Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development...
Chapter
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how it treats them. Insight into these critical areas for a business will aid in the development of a robust customer experience strategy and in turn drive loyalty and recommend...
Article
Full-text available
Data gloves capable of measuring finger joint kinematics can provide objective range of motion information useful for clinical hand assessment and rehabilitation. Data glove sensors are strategically placed over specific finger joints to detect movement of the wearers’ hand. The construction of the sensors used in a data glove, the number of sensor...
Chapter
Full-text available
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the acti...
Chapter
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of issues which are technical, social, physical and organisational in nature because of the complex gathering of large population numbers in such a spatially limited area. This ra...
Chapter
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff a...
Article
Full-text available
Purpose The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large...
Research Proposal
Full-text available
Edited Book: Computational Intelligence for Medical Internet of Things (MIoT) Application Systems Publication in "Series: Advances in ubiquitous sensing applications for healthcare", by Elsevier Submission link: https://easychair.org/conferences/?conf=miot-21 Chapter Submission Deadline: November, 2021
Research Proposal
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for the Digital Economy, Innovation and Cyber Security – Health in the Pandemic Era. - The book is specifically dedicated to scientific and technological innovations developed during the pandemic era, and - contributes to the discourse on health security innovat...
Book
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for the Digital Economy, Innovation and Cyber Security – Health in the Pandemic Era. - The book is specifically dedicated to scientific and technological innovations developed during the pandemic era, and - contributes to the discourse on health security innovat...
Book
The Editors, Anthony C. Ijeh and Kevin Curran invite the submission of book proposals for Location-Based Service Technology - In the Experience Age. - The book provides an overview of contemporary location-based service technology around the globe, and - contributes to the discourse on using an open community approach and supporting local ecosyst...
Book
Full-text available
This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation. Scandals such as those at OPCW and Gatwick Airport have reinforce...
Article
Full-text available
In the absence of specialized encryption hardware, cryptographic operations must be performed in main memory. As such, it is common place for cyber criminals to examine the content of main memory with a view to retrieving high-value data in plaintext form and/or the associated decryption key. In this paper, the author presents a number of simple me...
Article
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and sto...
Article
Full-text available
Multi-factor Authentication (MFA) often referred to as Two-factor Authentication (2FA), which is a subset of MFA, is the practice of implementing additional security methods on top of a standard username and password to help authenticate the identity of a user and increase the security of data. This chapter will investigate the problem with usernam...
Article
Full-text available
Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information. In 2018, 75% of CEOs and board members considered cyber security and technology a...
Article
Full-text available
Smart cities achieved digital transformation of patients’ health records through the use of new technology in IoT healthcare industry. Such technologies of using IoT and remote patient monitoring systems have become dramatically fundamental to reduce the movement of patients, and hence reducing the risk of spreading Covid-19 infection. The Ministry...
Article
Full-text available
Capturi ng hand motions for hand function evaluations is essential in the medical field. For many allied health professionals, measuring joint range of motion (ROM) is an important skill. While the universal goniometer (UG) is the most used clinical tool for measuring joint ROM, developments in current sensor technology are providing clinicians wit...
Article
Full-text available
Early detection of Rheumatoid Arthritis (RA) and other neurological conditions is vital for effective treatment. Existing methods of detecting RA rely on observation, questionnaires, and physical measurement, each with their own weaknesses. Pharmaceutical medications and procedures aim to reduce the debilitating effect, preventing the progression o...
Article
Full-text available
On 25 May 2018, the General Data Protection Regulation (GDPR) Article 17, the Right to Erasure (“Right to be Forgotten”) came into force, making it vital for organisations to identify, locate and delete all Personally Identifiable Information (PII) where a valid request is received from a data subject to erase their PII and the contractual period h...
Chapter
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices p...
Chapter
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available information services. Security and proper authentication is critical in any online learning environment because any flaws can affect perceptions of its trustworthiness. Biom...
Article
Full-text available
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments...
Article
Full-text available
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide mask identities while using websites and web-services. Anonymising Proxies and/or VPNs act as an intermediary between a use...
Article
Full-text available
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to dete...
Conference Paper
Full-text available
Infrastructure-free Indoor Positioning Systems (IPS) are a relatively new advancement in the indoor localisation area. Traditionally, IPS's require a certain amount of dedicated infrastructure within a building to position a device accurately. There are now companies offering infrastructure-free IPS that claim they can obtain sub-metre accuracy. So...
Article
Full-text available
Current world events have forced a sudden remote-working economy that many businesses were simply not prepared for. According to a Gartner survey of 229 human resources (HR) managers, 81% or more are working remotely, and 41% are likely to do so at least some of the time even once a return to normal working is permitted. This sudden rise in remote...
Article
Full-text available
On 25 May 2018, the General Data Protection Regulation (GDPR)Article 17, the Right to Erasure (‘Right to be Forgotten’) came into force making it vital for organisations to identify, locate and delete all Personally Identifiable Information (PII) where a valid request is received from a data subject to erase their PII and the contractual period has...
Article
Full-text available
Denial of service (DoS) attack continues to pose a huge risk to online businesses. The attack has moved from attack at the network level – layer 3 and layer 4 to the layer 7 of the OSI model. This layer 7 attack or application layer attack is not easily detectable by firewalls and most intrusion Detection systems and other security tools but have t...
Article
Image segmentation plays a crucial role in many image processing and understanding applications. Despite the huge number of proposed image segmentation techniques, accurate segmentation remains a significant challenge in image analysis. This article investigates the viability of using echo state network (ESN), a biologically inspired recurrent neur...
Preprint
Full-text available
Coronaviruses are a famous family of viruses that causes illness in human or animals. The new type of corona virus COVID-19 disease was firstly discovered in Wuhan-China. However, recently, the virus has been widely spread in most of the world countries and is reported as a pandemic. Further, nowadays, all the world countries are striving to contro...
Poster
Full-text available
Blockchain technology is still in its infancy, but the capacity to overcome the requirement for third parties to operate as a level of trust is one of its strengths. A review of the literature found that the link between implementation areas and business opportunities for blockchain technology was superficially covered (Vitsø et al., 2017). This wo...
Article
The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter the zone transfer attack via the generation of DNSSEC keys on the name servers which prevent attackers from obtaining a full zone transfer as its request for the transfer...
Article
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff a...
Article
Full-text available
People are interacting increasingly with systems through voice assistants and chatbots sectors such as banking and financial are adopting them to create more responsive customer services. This project aimed to implement a web-based chatbot to assist with online banking, using tools that expose artificial intelligence methods such as natural languag...
Article
Full-text available
In a world of ever-growing customer data, businesses are required to have a clear line of sight into what their customers think about the business, its products, people and how it treats them. Insight into these critical areas for a business will aid in the development of a robust customer experience strategy and in turn drive loyalty and recommend...
Article
The aim of this study was to evaluate the usage of a reminiscence app by people living with dementia and their family carers, by comparing event log data generated from app usage alongside the qualitative experience of the process. A cross-comparative analysis of electronic event logging data with qualitative interview data was conducted. Electroni...
Research
Full-text available
This report provides an in-depth analysis of the complex data issues involved in digital music content. Commissioned by the UK Intellectual Property Office (IPO) and sponsored by the two key UK music collection societies, PRS for Music and PPL, this report reveals stumbling blocks the music industry should face in order to tap into the full potenti...
Article
Smartphones are becoming increasingly pervasive in almost every aspect of daily life. With smartphones being equipped with multiple sensors, they provide an opportunity to automatically extract information relating to daily life. Information relating to daily life could have major benefits in the area of health informatics. Research shows that ther...
Article
2520 Background: Autologous chimeric antigen receptor (CAR) T cell therapy has shown to be effective in CD19+ relapsed or refractory (R/R) B-ALL but requires a 2-4 week period of cell processing and manufacture. During this “bridging period,” patients are vulnerable to disease progression and complications. We sought to characterize bridging strate...
Chapter
Tracking people indoors can be valuable in smart living scenarios such as tracking shoppers in a mall or in healthcare situations when tracking the movement of elderly patients can allow them to remain more independent. Determining accurate movement of people indoors is problematic however as there is no universal tracking system such as GPS which...
Article
With smart-devices becoming increasingly more commonplace, methods of capturing an individual's activities are becoming feasible. This is more generally performed through questionnaires or within unnatural environments bringing drawbacks in accuracy or requiring impractical conditions. This paper presents a simpler method of data collection which r...
Chapter
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the acti...
Chapter
Quantifying individual’s levels of activity through smart or proprietary devices is currently an active area of research. Current implementations use subjective methods, for instance, questionnaires or require comprehensively annotated datasets for automated classification. Each method brings its own specific drawbacks. Questionnaires cause recall...
Chapter
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment camps for young people have sprung up around in a bid to address this contemporary issue. This chapter examines the factors in Internet addiction, its definition, the compl...
Chapter
The deployment of online e-learning can lead to many security risks, such as confidentiality loss, exposure of critical data, availability and destruction of publicly available information services. Security and proper authentication is critical in any online learning environment because any flaws can affect perceptions of its trustworthiness. Biom...
Chapter
The potential for technology to support memory or enhance cognition for people living with dementia is currently an area of significant interest. The use of digital systems to facilitate reminiscing has been shown to be beneficial for people living with dementia. This paper reports on a study that examines the value of several common usability test...
Chapter
Drones, also referred to as UAV's (Unmanned Aerial Vehicle), are an aircraft without a human pilot. Drones have been used by various military organisations for over a decade, but in recent years drones a have been emerging more and more in commercial and recreational capacity. The paper is aimed at drone and UAV technology capabilities and how they...
Chapter
Internet addiction (IA) is typically defined as a condition where an individual has lost control of their internet use and proceeds to use the internet excessively to the point where he/she experiences problematic consequences which ultimately have a negative effect on his/her life. The authors examine what constitutes an addiction, the definition...
Chapter
Mobile technology today is increasingly being used to help improve underdeveloped and developing areas such as Sub-Saharan Africa. With the statistics showing the number of adults in Africa owning mobile devices steadily increasing, mobile technology has been a popular area of interest to use to help improve areas such as healthcare and education t...
Article
Recent studies have focused on the use of technology to support reminiscence but there remains a dearth of research on the health costs and benefits associated with this intervention. The aim of this study was to estimate costs and quality of life associated with a home based, individual specific reminiscence intervention, facilitated by an iPad ap...
Article
Full-text available
Building a secure electronic voting system is a difficult task. The US Pentagon dropped their proposed online voting system which would have given overseas military personnel the opportunity to vote in the elections in 2005, citing the inability to ensure the legitimacy of votes as the reason. There is however a new cry in the wild to deploy a voti...
Article
Full-text available
Electricity markets are different from other markets as electricity generation cannot be easily stored in substantial amounts and to avoid blackouts, the generation of electricity must be balanced with customer demand for it on a second-by-second basis. Customers tend to rely on electricity for day-to-day living and cannot replace it easily so when...
Article
The aim of this qualitative study was to explore the impact of a home-based, personalised reminiscence programme facilitated through an iPad app on people living with dementia and their family carers. Semi-structured interviews were used to collect data from 15 people living with dementia and 17 family carers from a region of the United Kingdom. Th...
Article
Full-text available
It gives me great pleasure to invite you to contribute to the inaugural edition of the JBBA - Journal of the British Blockchain Association. The JBBA is Europe’s first peer reviewed, academic journal devoted to Blockchain & other Distributed Ledger Technologies and Cryptocurrencies. Peer-review is a critical part of the functioning of the scientifi...
Article
Full-text available
Identification of persons by way of biometric features is an emerging phenomenon. Over the years, biometric recognition has received much attention due to its need for security. Amongst the many existing biometrics, fingerprints are considered to be one of the most practical ones. Techniques such as watermarking and steganography have been used in...
Chapter
The introduction of the 21st century has experienced a growing trend in the number of people who choose to live within a city. Rapid urbanisation however, comes a variety of issues which are technical, social, physical and organisational in nature because of the complex gathering of large population numbers in such a spatially limited area. This ra...
Conference Paper
Full-text available
There has been a growth in popularity of privacy in the personal computing space and this has influenced the IT industry. There is more demand for websites to use more secure and privacy focused technologies such as HTTPS and TLS. This has had a knock-on effect of increasing the popularity of Virtual Private Networks (VPNs). There are now more VPN...
Article
Vehicular accidents are a major global problem, leading to human injury, damages to property, financial losses and other negative impacts on the general public. In most cases, vehicular accidents are caused by avoidable human error and improper driving practices. With recent advances in sensing technologies, self-driving, connected cars and autonom...
Chapter
Determining the location of individuals within indoor locations can be useful in various scenarios including security, gaming and ambient assisted living for the elderly. Healthcare services globally are seeking to allow people to stay in their familiar home environments longer due to the multitude of benefits associated with living in non-clinical...
Chapter
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices p...
Article
Full-text available
The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical...
Article
Location-aware services enable location intelligence which provides many benefits such as personalisation of communications, consumer analytics, locating a fireman in a burning building or classifying daily activities in the home among numerous other services. Active localisation technology is where a person carries a device such as a phone or beac...
Chapter
Internet addiction is a recent phenomenon which describes a state where people become so involved in online behaviour to the detriment of other aspects of their lives. Treatment camps for young people have sprung up around in a bid to address this contemporary issue. This chapter examines the factors in Internet addiction, its definition, the compl...