The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution

Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...

Full description

Saved in:
Bibliographic Details
Main Authors: Che Akmal, Che Yahaya, Ahmad, Firdaus, Ernawan, Ferda, Wan Isni Sofiah, Wan Din
Format: Article
Language:English
Published: Politeknik Negeri Padang 2022
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf
http://umpir.ump.edu.my/id/eprint/38135/
http://dx.doi.org/10.30630/joiv.6.2-2.1095
http://dx.doi.org/10.30630/joiv.6.2-2.1095
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first