FOUR-PHASE PROTOCOL FOR DETECTION, DELETION, PROTECTION AND RECOVERY FROM AUTORUN VIRUS

Faculty Computer Science Year: 2018
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Journal of Theoretical and Applied Information Technology Journal of Theoretical and Applied Information Technology Volume:
Keywords : FOUR-PHASE PROTOCOL , DETECTION, DELETION, PROTECTION , RECOVERY FROM    
Abstract:
Keeping any computing system stable is a very sentenced job, since virus programs can easily infect any computing system via external devices such as pen drive, floppy disk, Memory sticks, DVDs, CD ROMs, and USB devices. The auto run viru
   
     
 
       

Author Related Publications

  • Amir El Sayed Godaa Hassan, "FOUR-PHASE PROTOCOL FOR DETECTION, DELETION, PROTECTION AND RECOVERY FROM AUTORUN VIRUS", Journal of Theoretical and Applied Information Technology, 2018 More
  • Amir El Sayed Godaa Hassan, "P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture", MDPI, 2023 More
  • Amir El Sayed Godaa Hassan, "FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks", IEEE, 2023 More
  • Amir El Sayed Godaa Hassan, "LBTMA: An integrated P4-enabled framework for optimized traffic management in SD-IoT networks", ELSEVIER, 2024 More
  • Amir El Sayed Godaa Hassan, "MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and new P4-extracted feature set", ELSEVIER, 2024 More

Department Related Publications

  • Yasmeen Mohamed Mohamed Khedr, "TransMix: Crafting highly transferable adversarial examples to evade face recognition models", Elsevier (Science Direct), 2024 More
  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Nabil Ali Mohamed Lashen, "Support Vector Machine and K-Nearest Neighbor Based Microcalcification Classification in a Mammographic CAD System", IJETSE International Journal of Emerging Technologies in Sciences and Engineering, 2011 More
  • Walid Ibrahim Ibrahim Khedr, "Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model", Tech Science Press, 2022 More
  • Nabil Ali Mohamed Lashen, "Restoration Methods For Biomedical Images In Confocal Microscopy", 2024 More
Tweet