Tom Lunney

850 total citations
45 papers, 485 citations indexed

About

Tom Lunney is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Tom Lunney has authored 45 papers receiving a total of 485 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Artificial Intelligence, 16 papers in Information Systems and 15 papers in Computer Vision and Pattern Recognition. Recurrent topics in Tom Lunney's work include Context-Aware Activity Recognition Systems (9 papers), Internet Traffic Analysis and Secure E-voting (7 papers) and Network Security and Intrusion Detection (7 papers). Tom Lunney is often cited by papers focused on Context-Aware Activity Recognition Systems (9 papers), Internet Traffic Analysis and Secure E-voting (7 papers) and Network Security and Intrusion Detection (7 papers). Tom Lunney collaborates with scholars based in United Kingdom, United States and Mexico. Tom Lunney's co-authors include Kevin Curran, Eoghan Furey, José Santos, Paul Mc Kevitt, Joan Condell, Julieta Noguez, Luis Neri, R. H. Perrott, Jennifer Hyndman and T.M. McGinnity and has published in prestigious journals such as SHILAP Revista de lepidopterología, Computer Physics Communications and Information and Software Technology.

In The Last Decade

Tom Lunney

42 papers receiving 446 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tom Lunney United Kingdom 10 144 128 119 99 79 45 485
H L Gururaj India 12 138 1.0× 108 0.8× 159 1.3× 83 0.8× 72 0.9× 77 527
Valerio Bellandi Italy 15 115 0.8× 115 0.9× 145 1.2× 75 0.8× 252 3.2× 72 692
Media Anugerah Ayu Indonesia 13 115 0.8× 160 1.3× 123 1.0× 97 1.0× 181 2.3× 115 607
Yeh-Cheng Chen United States 15 231 1.6× 226 1.8× 185 1.6× 107 1.1× 91 1.2× 68 696
Qi Liao United States 12 222 1.5× 113 0.9× 159 1.3× 135 1.4× 140 1.8× 56 546
Abdulaziz Almehmadi Saudi Arabia 11 142 1.0× 108 0.8× 162 1.4× 92 0.9× 35 0.4× 28 399
Shah Khalid Khan Australia 15 104 0.7× 122 1.0× 77 0.6× 236 2.4× 38 0.5× 41 657
Georgios Chatzimilioudis Cyprus 12 151 1.0× 53 0.4× 188 1.6× 204 2.1× 67 0.8× 25 593

Countries citing papers authored by Tom Lunney

Since Specialization
Citations

This map shows the geographic impact of Tom Lunney's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tom Lunney with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tom Lunney more than expected).

Fields of papers citing papers by Tom Lunney

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tom Lunney. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tom Lunney. The network helps show where Tom Lunney may publish in the future.

Co-authorship network of co-authors of Tom Lunney

This figure shows the co-authorship network connecting the top 25 collaborators of Tom Lunney. A scholar is included among the top collaborators of Tom Lunney based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tom Lunney. Tom Lunney is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Curran, Kevin, et al.. (2021). Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses. International Journal of Digital Crime and Forensics. 13(6). 1–20. 1 indexed citations
2.
Curran, Kevin, et al.. (2018). Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. Ulster University Research Portal (Ulster University). 1–8. 24 indexed citations
3.
Condell, Joan, et al.. (2018). Bayesi-Chain: Intelligent Identity Authentication. 1–6. 4 indexed citations
4.
Condell, Joan, et al.. (2018). A Review of Identity, Identification and Authentication. Ulster University Research Portal (Ulster University). 8(2). 794–804. 3 indexed citations
5.
Condell, Joan, et al.. (2018). Digital Footprints: Your Unique Identity. Electronic workshops in computing. 4 indexed citations
6.
Noguez, Julieta, et al.. (2016). A Computational Model of Learners Achievement Emotions Using Control- Value Theory. Educational Technology & Society. 19(2). 42–56. 7 indexed citations
7.
Lunney, Tom, et al.. (2016). Aggregating social media data with temporal and environmental context for recommendation in a mobile tour guide system. Journal of Hospitality and Tourism Technology. 7(3). 281–299. 33 indexed citations
8.
Kevitt, Paul Mc, et al.. (2015). 360-MAM-Affect: Sentiment Analysis with the Google Prediction API and EmoSenticNet. SHILAP Revista de lepidopterología. 5 indexed citations
9.
Lunney, Tom, et al.. (2013). Context-aware intelligent recommendation system for tourism. Ulster University Research Portal (Ulster University). 91 indexed citations
10.
Curran, Kevin, et al.. (2011). An evaluation of indoor location determination technologies. Journal of Location Based Services. 5(2). 61–78. 125 indexed citations
11.
Kevitt, Paul Mc, et al.. (2010). NewsViz: Emotional Visualization of News Stories. Ulster University Research Portal (Ulster University). 125–130. 7 indexed citations
12.
Noguez, Julieta, et al.. (2010). Work in progress — Towards an emotional learning model for intelligent gaming. Ulster University Research Portal (Ulster University). 2. T3G–1. 1 indexed citations
13.
Lunney, Tom, et al.. (2009). Ambient Interface Design (AID) for Aging, Independence and Disability. 1 indexed citations
14.
Lee, Man Yee Karen, Tom Lunney, Kevin Curran, & José Santos. (2009). A Context-Aware Platform for Computer Assisted Healthcare. 1 indexed citations
15.
Furey, Eoghan, et al.. (2008). Location Awareness Trials at the University of Ulster, Networkshop 2008. 4 indexed citations
16.
Lunney, Tom, et al.. (2003). Object persistence in Java. 115–120. 4 indexed citations
17.
Lunney, Tom, et al.. (2002). A fuzzy logic controlled genetic algorithm environment. 3. 2181–2186. 11 indexed citations
18.
Lunney, Tom, et al.. (2002). Using fuzzy logic to optimize genetic algorithm performance. 24. 271–275. 8 indexed citations
19.
Lunney, Tom, et al.. (2001). Java garbage collection — a generic solution?. Information and Software Technology. 43(2). 151–155. 3 indexed citations
20.
Lunney, Tom, et al.. (2000). Component based distributed systems – CORBA and EJB in context. Computer Physics Communications. 127(2-3). 207–214. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026