Areas of Expertise: Cybersecurity and Networking
James has expertise in Computer Networking and Network Security/Cybersecurity and is a Fellow of Higher Education Academy. He is also quite keen on Software Defined Networking and teaches on our Computer Science courses.
James has been teaching in higher education since 2007 and is a passionate academic who thrives to give his students the best possible learning experience they can have. His research started with learning with mobile devices for disaffected youths excluded from mainstream education. However, as technology has evolved, James is now focusing on Computer Networking and Cybersecurity and is also keen to explore multiprotocol label switching (MPLS) in service provider networks, software defined networking (SDN) and network automation. He is currently a member of our Cyber Security and Networking Research Group.
In 2007, James was awarded a Royal Academy of Engineering International Travel Grant to present a research paper on Service Discovery and also chair a session at the IEEE Portable 2007, an International Conference on Portable Information Devices at the Cellular Telecommunications Industry Association (CTIA), in Orlando, Florida, USA.
Assora, M., Kadirire, J., Shirvani, A. (2007). A Web Transaction Security Scheme Based on Disposable Credit Card Numbers. International Journal of Electronic Security and Digital Forensics(IJESDF, Vol. 1,No. 2, 2007. Available at: http://www.inderscience.com/offer.php?id=16864
Assora, M., Kadirire, J., Shirvani, A. (2007). Using WPKI for Security of Web Transaction. 7th International Conference on Electronic Commerce and Web Technologies - EC-Web '07., Berlin Heidelberg, Germany. Springer-Verlag, pp.11-20.
Assora, M., Kadirire, J., Shivani, A. (2007). Online Transaction Security Scheme Based on Wireless Security Services. Proceedings of the 3rd Annual International Conference on Global e-Security (ICGsS 07), April 18-20, 2007, pp 241-247.
Kadirire J. (2010). Online Transactions’ Security. In: H. Jahankhani, G. Me & D. L. Watson (Eds.), Handbook of Electronic Security and Digital Forensics (pp. 133-153). London, UK: World Scientific Publisher, ISBN-13 978-981-283-703-5.
Kadirire, J. (2009). Mobile Learning DeMystified. In: R. Guy (Ed.), The Evolution of Mobile Teaching and Learning (pp. 15-55). Santa Rosa , California, USA: Informing Science Press. ISBN 978-1932886-14- 6 http://books.google.com/books/p/8282589572543298?id=Cz5SCEaHNAMC&pg=PP10&dq=The+Evolution+of+Mobile+Teaching+and+Learning#PPP1,M1
Kadirire, J. (2007). Portable Information Devices – Service Discovery. IEEE Portable 2007 Conference Proceedings, International Conference on Portable Information Devices, March 25-27, 2007. Orlando, Florida, USA. IEEE and IEEE Explore. Available at: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4216912
Kadirire, J. (2007). Instant Messaging for Creating Interactive and Collaborative m-Learning Environments. The International Review of Research in Open and Distance Learning , Vol.8, No.2, June 2007.
Parvu, A., Kadirire, J. (2009), Rapid Prototyping and Usability Problem Identification Using Low and High-Fidelity Prototypes, Serious Games on the Move 08, New York, SpringerWien, pp105-113, ISBN 978-3-211-09417-4
BT Case Reference A26013 (Publication date: 01/09/2002), Location dependent service access. 00305716.3-2216. (http://www.freepatentsonline.com/EP1170920.html). This is about access to distributed computer systems via a distributed Sun Microsystem’s “Jini” lookup service, coupled with an LDAP authentication server, developed in Java on a Windows & Solaris platform, which allows federated services like printing services, etc., within a geographical area to be accessed by small devices such as portable digital assistants and laptops.