The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2022
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf http://umpir.ump.edu.my/id/eprint/38135/ http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.38135 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.381352023-07-27T08:36:25Z http://umpir.ump.edu.my/id/eprint/38135/ The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din QA75 Electronic computers. Computer science Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits. Politeknik Negeri Padang 2022 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf Che Akmal, Che Yahaya and Ahmad, Firdaus and Ernawan, Ferda and Wan Isni Sofiah, Wan Din (2022) The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution. International Journal on Informatics Visualization, 6 (2-2). pp. 489-497. ISSN 2549-9904. (Published) http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
description |
Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits. |
format |
Article |
author |
Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din |
author_facet |
Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din |
author_sort |
Che Akmal, Che Yahaya |
title |
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
title_short |
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
title_full |
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
title_fullStr |
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
title_full_unstemmed |
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution |
title_sort |
relevance of bibliometric analysis to discover the area's research efforts: root exploit evolution |
publisher |
Politeknik Negeri Padang |
publishDate |
2022 |
url |
http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf http://umpir.ump.edu.my/id/eprint/38135/ http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095 |
_version_ |
1772811359089590272 |
score |
13.211869 |