Digital image steganography: Survey and analysis of current methods A Cheddad, J Condell, K Curran, P Mc Kevitt Signal processing 90 (3), 727-752, 2010 | 2290 | 2010 |
Understanding the Internet K Curran Chandos Publishing 1, 350, 2009 | 774* | 2009 |
A survey of active and passive indoor localisation systems G Deak, K Curran, J Condell Computer Communications 35 (16), 1939-1954, 2012 | 546 | 2012 |
An evaluation of image based steganography methods K Bailey, K Curran Multimedia Tools and Applications 30, 55-88, 2006 | 427 | 2006 |
A novel AI-enabled framework to diagnose coronavirus COVID-19 using smartphone embedded sensors: design study HS Maghded, KZ Ghafoor, AS Sadiq, K Curran, DB Rawat, K Rabie 2020 IEEE 21st international conference on information reuse and integration …, 2020 | 327 | 2020 |
Cloud computing security S Carlin, K Curran Pervasive and ubiquitous technology innovations for ambient intelligence …, 2013 | 327 | 2013 |
An evaluation of indoor location determination technologies K Curran, E Furey, T Lunney, J Santos, D Woods, A McCaughey Journal of Location Based Services 5 (2), 61-78, 2011 | 314 | 2011 |
A survey of geographical routing in wireless ad-hoc networks F Cadger, K Curran, J Santos, S Moffett IEEE Communications Surveys & Tutorials 15 (2), 621-653, 2012 | 292 | 2012 |
Advertising on facebook K Curran, S Graham, C Temple International Journal of E-business development 1 (1), 26-33, 2011 | 278 | 2011 |
Context-aware intelligent recommendation system for tourism K Meehan, T Lunney, K Curran, A McCaughey 2013 IEEE international conference on pervasive computing and communications …, 2013 | 206 | 2013 |
CLOUD COMPUTING-TECHNOLOGIES. MI Malik, SH Wani, A Rashid International Journal of Advanced Research in Computer Science 9 (2), 2018 | 201 | 2018 |
A skin tone detection algorithm for an adaptive approach to steganography A Cheddad, J Condell, K Curran, P Mc Kevitt signal processing 89 (12), 2465-2478, 2009 | 189 | 2009 |
Near field communication K Curran, A Millar, C Mc Garvey International Journal of Electrical and Computer Engineering 2 (3), 371, 2012 | 172 | 2012 |
An overview of steganography techniques applied to the protection of biometric data M Douglas, K Bailey, M Leeney, K Curran Multimedia Tools and Applications 77 (13), 17333-17373, 2018 | 154 | 2018 |
A hash-based image encryption algorithm A Cheddad, J Condell, K Curran, P McKevitt Optics communications 283 (6), 879-893, 2010 | 117 | 2010 |
Taking the information to the public through Library 2.0 K Curran, M Murray, M Christian Library hi tech 25 (2), 288-297, 2007 | 116 | 2007 |
Biometric inspired digital image steganography A Cheddad, J Condell, K Curran, P Mc Kevitt 15th Annual IEEE International Conference and Workshop on the Engineering of …, 2008 | 114 | 2008 |
A dynamic threshold approach for skin segmentation in color images P Yogarajah, J Condell, K Curran, A Cheddad, P McKevitt 2010 IEEE International Conference on Image Processing, 2225-2228, 2010 | 103 | 2010 |
Social networking in education N McCarroll, K Curran International Journal of Innovation in the Digital Economy (IJIDE) 4 (1), 1-15, 2013 | 97 | 2013 |
A secure and improved self-embedding algorithm to combat digital document forgery A Cheddad, J Condell, K Curran, P Mc Kevitt Signal Processing 89 (12), 2324-2332, 2009 | 93 | 2009 |