The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since...
| Main Authors: | Che Akmal, Che Yahaya, Ahmad, Firdaus, Ernawan, Ferda, Wan Isni Sofiah, Wan Din |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Politeknik Negeri Padang
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38135/ http://umpir.ump.edu.my/id/eprint/38135/7/The%20Relevance%20of%20Bibliometric%20Analysis%20to%20Discover.pdf |
Similar Items
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
A bibliometric statistical analysis of the fuzzy inference system - based classifiers
by: Chen, Wenhao, et al.
Published: (2021)
by: Chen, Wenhao, et al.
Published: (2021)
Internet of Things: An Implementation and Its Challenges in Malaysia
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2018)
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2018)
Towards a systematic description of the field using bibliometric analysis: malware evolution
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
A generalized three-tier hybrid model for classifying unseen (IoT devices) in smart home environments
by: Waseem, Quadri, et al.
Published: (2025)
by: Waseem, Quadri, et al.
Published: (2025)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
Harvesting solutions: discover the evolution of agriculture wastewater treatment through comprehensive bibliometric analysis using Scopus database 1971-2023
by: Wan Jusoh, Hajjar Hartini, et al.
Published: (2024)
by: Wan Jusoh, Hajjar Hartini, et al.
Published: (2024)
A New Psychovisual Threshold Technique in Image Processing Applications
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Distance based thresholds for 2-tier relay nodes selection in WSN
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
Drift management in ML-based IoT device classification: A survey and evaluation
by: Waseem, Quadri, et al.
Published: (2024)
by: Waseem, Quadri, et al.
Published: (2024)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
An improved robust image watermarking by using different embedding strengths
by: Ernawan, Ferda, et al.
Published: (2020)
by: Ernawan, Ferda, et al.
Published: (2020)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Trends in IoT intrusion detection: A bibliometric analysis of deep learning approaches
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients
by: Ernawan, Ferda, et al.
Published: (2021)
by: Ernawan, Ferda, et al.
Published: (2021)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023)
by: Afrig, Aminuddin, et al.
Published: (2023)
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
by: Goh, Wei Sheng, et al.
Published: (2023)
by: Goh, Wei Sheng, et al.
Published: (2023)
Stability analysis of relay access protocol (RAP) using fuzzy logic in wireless sensor networks
by: Azamuddin, Abdul Rahman, et al.
Published: (2020)
by: Azamuddin, Abdul Rahman, et al.
Published: (2020)
A review of cloud computing implementation in ASEAN countries
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
Real time vein visualization using near-infrared imaging
by: May, Y. H., et al.
Published: (2020)
by: May, Y. H., et al.
Published: (2020)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Ergonomic wireless digital notice board
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2021)
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2021)
Discovering Actors and Artefacts for Social Research Network Sites
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Discovering global trends of design in sustainable transportation: a bibliometric analysis and visualization
by: Abdul Kadir, Andi Nursyuhada, et al.
Published: (2024)
by: Abdul Kadir, Andi Nursyuhada, et al.
Published: (2024)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Where is my organ? Organ donation with blockchain system
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2021)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2021)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
Similar Items
-
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023) -
A bibliometric statistical analysis of the fuzzy inference system - based classifiers
by: Chen, Wenhao, et al.
Published: (2021) -
Internet of Things: An Implementation and Its Challenges in Malaysia
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2018) -
Towards a systematic description of the field using bibliometric analysis: malware evolution
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021) -
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)