Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 15
Page No. 5971 - 5975

Administering Substantial Security for Data Using Bits-Conversion, Stuffing and Shuffling Algorithm (Bits-CSS)

Authors : C. Thangamalar and K. Ravikumar

References

Blasing, T., L. Batyuk, A.D. Schmidt, S.A. Camtepe and S. Albayrak, 2010. An android application sandbox system for suspicious software detection. Proceedings of the 5th International Conference on Malicious and unwanted software (MALWARE’10), October 19-20, 2010, IEEE, Nancy, France, ISBN:978-1-4244-9353-1, pp: 55-62.

Deng, P., 2014. Research on computer virus and its defense technology in network environment. Silicon Valley, 7: 83-84.
Direct Link  |  

Huang, N.F., C.N. Kao and R.T. Liu, 2011. A novel software-based MD5 checksum lookup scheme for anti-virus systems. Proceedings of the 7th International Conference on Wireless Communications and Mobile Computing (IWCMC’11), July 4-8, 2011, IEEE, Istanbul, Turkey, ISBN:978-1-4244-9539-9, pp: 207-212.

Oberheide, J., E. Cooke and F. Jahanian, 2008. CloudAV: N-version antivirus in the network cloud. Proceedings of the 17th Symposium on USENIX Security, July 28-August 1, 2008, USENIX Association Berkeley, San Jose, California, USA., pp: 91-106.

Rozas, C., H. Khosravi, D.K. Sunder and Y. Bulygin, 2009. Enhanced detection of malware. Intl. Technol. J., 13: 6-15.
Direct Link  |  

Salah, K., J.M.A. Calero, S. Zeadally, S. Al-Mulla and M. Alzaabi, 2013. Using cloud computing to implement a security overlay network. IEEE. Secur. Privacy, 11: 44-53.
CrossRef  |  Direct Link  |  

Wang, X., T.L. Huang and Z.J. Ren, 2010. Notice of retraction research on the anti-virus system of military network based on cloud security. Proceedings of the International Conference on Intelligent Computing and Integrated Systems (ICISS’10), October 22-24, 2010, IEEE, Guilin, China, ISBN:978-1-4244-6834-8, pp: 656-659.

Weijie, L., 2015. Study on the implementation path of network security technology in the background of cloud computing. Netw. Secur. Technol. Appl., 2015: 48-48.

Xu, J., J. Yan, L. He, P. Su and D. Feng, 2010. Cloudsec: A cloud architecture for composing collaborative security services. Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom’10), November 30-December 3, 2010, IEEE, Indianapolis, Indiana, USA., ISBN:978-1-4244-9405-7l, pp: 703-711.

Yan, W. and E. Wu, 2009. Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. In: Complex Sciences, Zhou, J. (Ed.). Springer, Berlin, Germany, ISBN:978-3-642-02465-8, pp: 724.

Yi, W., 2015. Research on computer network security defense technology. Network Secur. Technol. Appl., 2015: 59-59.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved