The Rise of “malware”: Bibliometric Analysis of Malware Study
Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for Internet users. Rootkit, botnet, worm, spyware and Trojan horse are the most common types of malware. Most malware studies aim to investigate...
| Main Authors: | Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Rosli, Salleh, Ahmad, Firdaus |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/17011/ http://umpir.ump.edu.my/id/eprint/17011/1/The%20rise%20of%20%E2%80%9Cmalware%E2%80%9D-%20Bibliometric%20analysis%20of%20malware%20study.pdf |
Similar Items
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Towards a systematic description of the field using bibliometric analysis: malware evolution
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
The rise of “blockchain”: bibliometric analysis of blockchain study
by: Firdaus, Ahmad, et al.
Published: (2019)
by: Firdaus, Ahmad, et al.
Published: (2019)
Malware classification based on target location
by: Nasuha, Noor Baha
Published: (2014)
by: Nasuha, Noor Baha
Published: (2014)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Malware detection using n-gram with TF-IDF weighting
by: Natasha, Zainal
Published: (2018)
by: Natasha, Zainal
Published: (2018)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Android mobile malware detection system using fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Malware mobile devices in Indonesia
by: Drajad, Wiryawan, et al.
Published: (2019)
by: Drajad, Wiryawan, et al.
Published: (2019)
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
A Bayesian probability model for Android malware detection
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Similar Items
-
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024) -
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017) -
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021) -
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023) -
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)