The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution

Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...

Full description

Saved in:
Bibliographic Details
Main Authors: Che Akmal, Che Yahaya, Ahmad, Firdaus, Ernawan, Ferda, Wan Isni Sofiah, Wan Din
Format: Article
Language:English
Published: Politeknik Negeri Padang 2022
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf
http://umpir.ump.edu.my/id/eprint/38135/
http://dx.doi.org/10.30630/joiv.6.2-2.1095
http://dx.doi.org/10.30630/joiv.6.2-2.1095
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.38135
record_format eprints
spelling my.ump.umpir.381352023-07-27T08:36:25Z http://umpir.ump.edu.my/id/eprint/38135/ The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din QA75 Electronic computers. Computer science Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits. Politeknik Negeri Padang 2022 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf Che Akmal, Che Yahaya and Ahmad, Firdaus and Ernawan, Ferda and Wan Isni Sofiah, Wan Din (2022) The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution. International Journal on Informatics Visualization, 6 (2-2). pp. 489-497. ISSN 2549-9904. (Published) http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
description Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits.
format Article
author Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
author_facet Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
author_sort Che Akmal, Che Yahaya
title The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_short The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_full The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_fullStr The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_full_unstemmed The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_sort relevance of bibliometric analysis to discover the area's research efforts: root exploit evolution
publisher Politeknik Negeri Padang
publishDate 2022
url http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf
http://umpir.ump.edu.my/id/eprint/38135/
http://dx.doi.org/10.30630/joiv.6.2-2.1095
http://dx.doi.org/10.30630/joiv.6.2-2.1095
_version_ 1772811359089590272
score 13.211869