The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2022
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf http://umpir.ump.edu.my/id/eprint/38135/ http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!