The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution

Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...

Full description

Bibliographic Details
Main Authors: Che Akmal, Che Yahaya, Ahmad, Firdaus, Ernawan, Ferda, Wan Isni Sofiah, Wan Din
Format: Article
Language:English
Published: Politeknik Negeri Padang 2022
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/38135/
http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf
_version_ 1848825429795799040
author Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
author_facet Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
author_sort Che Akmal, Che Yahaya
building UMP Institutional Repository
collection Online Access
description Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits.
first_indexed 2025-11-15T03:28:47Z
format Article
id ump-38135
institution Universiti Malaysia Pahang
institution_category Local University
language English
last_indexed 2025-11-15T03:28:47Z
publishDate 2022
publisher Politeknik Negeri Padang
recordtype eprints
repository_type Digital Repository
spelling ump-381352023-07-27T08:36:25Z http://umpir.ump.edu.my/id/eprint/38135/ The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution Che Akmal, Che Yahaya Ahmad, Firdaus Ernawan, Ferda Wan Isni Sofiah, Wan Din QA75 Electronic computers. Computer science Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. To review the progress of root exploitation efforts globally, there is a need to inspect all publications that involve root exploitation. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become the main interest in root exploit studies. 2) Types of root exploit in the virtualization layer and studies to detect this area are increasing. 3) USA and China have become the leaders in root exploitation research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploits researchers were more focused on detecting root exploits. Politeknik Negeri Padang 2022 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf Che Akmal, Che Yahaya and Ahmad, Firdaus and Ernawan, Ferda and Wan Isni Sofiah, Wan Din (2022) The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution. International Journal on Informatics Visualization, 6 (2-2). pp. 489-497. ISSN 2549-9904. (Published) http://dx.doi.org/10.30630/joiv.6.2-2.1095 http://dx.doi.org/10.30630/joiv.6.2-2.1095
spellingShingle QA75 Electronic computers. Computer science
Che Akmal, Che Yahaya
Ahmad, Firdaus
Ernawan, Ferda
Wan Isni Sofiah, Wan Din
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_full The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_fullStr The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_full_unstemmed The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_short The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
title_sort relevance of bibliometric analysis to discover the area's research efforts: root exploit evolution
topic QA75 Electronic computers. Computer science
url http://umpir.ump.edu.my/id/eprint/38135/
http://umpir.ump.edu.my/id/eprint/38135/
http://umpir.ump.edu.my/id/eprint/38135/
http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf