SecurityTAG’S
Boddepalli Kiran Kumar1 , Korla Swaroopa2
Section:Research Paper, Product Type: Journal Paper
Volume-10 ,
Issue-1 , Page no. 41-44, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.4144
Online published on Jan 31, 2022
Copyright © Boddepalli Kiran Kumar, Korla Swaroopa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa, “SecurityTAG’S,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.41-44, 2022.
MLA Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa "SecurityTAG’S." International Journal of Computer Sciences and Engineering 10.1 (2022): 41-44.
APA Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa, (2022). SecurityTAG’S. International Journal of Computer Sciences and Engineering, 10(1), 41-44.
BibTex Style Citation:
@article{Kumar_2022,
author = {Boddepalli Kiran Kumar, Korla Swaroopa},
title = {SecurityTAG’S},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2022},
volume = {10},
Issue = {1},
month = {1},
year = {2022},
issn = {2347-2693},
pages = {41-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5435},
doi = {https://doi.org/10.26438/ijcse/v10i1.4144}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i1.4144}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5435
TI - SecurityTAG’S
T2 - International Journal of Computer Sciences and Engineering
AU - Boddepalli Kiran Kumar, Korla Swaroopa
PY - 2022
DA - 2022/01/31
PB - IJCSE, Indore, INDIA
SP - 41-44
IS - 1
VL - 10
SN - 2347-2693
ER -
VIEWS | XML | |
351 | 361 downloads | 154 downloads |
Abstract
In this paper, initially we describe the present antivirus in aspects like –memory[1] they are consuming, and how efficiently they are protecting the system. In the next section of this paper we briefly discuss the design methodologies that are practiced presently, their drawbacks and limitations. Finally we describe an effective design methodology which uses SecurityTAG to protect the system. SecurityTAG is generated by the SecurityTAG generator which takes some parameters as inputs and gives the SecurityTAG as the output. This gives better protection against any virus and detection of infected files is very easy and effective.
Key-Words / Index Term
SecurityTAG, generator, key, virus
References
[1] Memory- memory refers to the main memory or physical memory.
[2] van der Meulen, M.J.P., et al. Protective Wrapping of Off-the-Shelf Components. in the 4th International Conference on COTS-Based Software Systems (ICCBSS `05). Bilbao, Spain: Springer. 2005.
[3] Strigini, L., Fault Tolerance Against Design Faults, in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, H. Diab and A. Zomaya, Editors. J. Wiley & Sons. p. 213-241, 2005.
[4] http://www.raymond.cc/blog/archives/2008/07/11/ -free-antivirus-is-the-lightest-on-system-memory-usage/
[5] Fred Cohen, “Computer Viruses”, Computers €4 Security 0, 22-35.
[6] Computers & Security 7, Specid Issue on Viruses.
[7] Marvin Minsky, Computation: Finite and Infinite Machines, Prentice-Hall.