Open Access   Article Go Back

SecurityTAG’S

Boddepalli Kiran Kumar1 , Korla Swaroopa2

Section:Research Paper, Product Type: Journal Paper
Volume-10 , Issue-1 , Page no. 41-44, Jan-2022

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v10i1.4144

Online published on Jan 31, 2022

Copyright © Boddepalli Kiran Kumar, Korla Swaroopa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa, “SecurityTAG’S,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.41-44, 2022.

MLA Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa "SecurityTAG’S." International Journal of Computer Sciences and Engineering 10.1 (2022): 41-44.

APA Style Citation: Boddepalli Kiran Kumar, Korla Swaroopa, (2022). SecurityTAG’S. International Journal of Computer Sciences and Engineering, 10(1), 41-44.

BibTex Style Citation:
@article{Kumar_2022,
author = {Boddepalli Kiran Kumar, Korla Swaroopa},
title = {SecurityTAG’S},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2022},
volume = {10},
Issue = {1},
month = {1},
year = {2022},
issn = {2347-2693},
pages = {41-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5435},
doi = {https://doi.org/10.26438/ijcse/v10i1.4144}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i1.4144}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5435
TI - SecurityTAG’S
T2 - International Journal of Computer Sciences and Engineering
AU - Boddepalli Kiran Kumar, Korla Swaroopa
PY - 2022
DA - 2022/01/31
PB - IJCSE, Indore, INDIA
SP - 41-44
IS - 1
VL - 10
SN - 2347-2693
ER -

VIEWS PDF XML
351 361 downloads 154 downloads
  
  
           

Abstract

In this paper, initially we describe the present antivirus in aspects like –memory[1] they are consuming, and how efficiently they are protecting the system. In the next section of this paper we briefly discuss the design methodologies that are practiced presently, their drawbacks and limitations. Finally we describe an effective design methodology which uses SecurityTAG to protect the system. SecurityTAG is generated by the SecurityTAG generator which takes some parameters as inputs and gives the SecurityTAG as the output. This gives better protection against any virus and detection of infected files is very easy and effective.

Key-Words / Index Term

SecurityTAG, generator, key, virus

References

[1] Memory- memory refers to the main memory or physical memory.
[2] van der Meulen, M.J.P., et al. Protective Wrapping of Off-the-Shelf Components. in the 4th International Conference on COTS-Based Software Systems (ICCBSS `05). Bilbao, Spain: Springer. 2005.
[3] Strigini, L., Fault Tolerance Against Design Faults, in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, H. Diab and A. Zomaya, Editors. J. Wiley & Sons. p. 213-241, 2005.
[4] http://www.raymond.cc/blog/archives/2008/07/11/ -free-antivirus-is-the-lightest-on-system-memory-usage/
[5] Fred Cohen, “Computer Viruses”, Computers €4 Security 0, 22-35.
[6] Computers & Security 7, Specid Issue on Viruses.
[7] Marvin Minsky, Computation: Finite and Infinite Machines, Prentice-Hall.