The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution
DOI: http://dx.doi.org/10.30630/joiv.6.2-2.1095
Abstract
Keywords
Full Text:
PDFReferences
W. Kong, “Research on Technology of Process Hiding based on VMM,†2015 International Conference on Computer Science and Applications (CSA), pp. 339–344, 2015, doi: 10.1109/CSA.2015.26.
P. Nimbalkar and D. Kshirsagar, “Feature selection for intrusion detection system in Internet-of-Things (IoT),†ICT Express, vol. 7, no. 2, pp. 177–181, 2021, doi: 10.1016/j.icte.2021.04.012.
M. Lechtik and G. Dedola, “Operation TunnelSnake,†2021. https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831/ (accessed May 06, 2021).
A. Sharma, “Microsoft admits to signing rootkit malware in supply-chain fiasco,†2021. https://www.bleepingcomputer.com/news/security/microsoft-admits-to-signing-rootkit-malware-in-supply-chain-fiasco/ (accessed Sep. 09, 2021).
S. R. T. Mat, M. F. Ab Razak, M. N. M. Kahar, J. M. Arif, S. Mohamad, and A. Firdaus, “Towards a systematic description of the field using bibliometric analysis: malware evolution,†Scientometrics, vol. 126, no. 3, pp. 2013–2055, 2021, doi: 10.1007/s11192-020-03834-6.
S. K. Jalal, “Co-authorship and co-occurrences analysis using bibliometrix r-package: A case study of india and bangladesh,†Annals of Library and Information Studies, vol. 66, no. 2, pp. 57–64, 2019.
D. Agapito, “The senses in tourism design: A bibliometric review,†Annals of Tourism Research, vol. 83, no. December 2019, 2020, doi: 10.1016/j.annals.2020.102934.
I. Firmansyah and A. S. Rusydiana, “Bibliometric Analysis of Articles on Accounting and Covid-19 during the Pandemic,†Library Philosophy and Practice, vol. 2021, pp. 1–15, 2021.
R. Orastean, S. C. Marginean, and R. Sava, “Bitcoin in the scientific literature - A bibliometric study,†Studies in Business and Economics, vol. 14, no. 3, pp. 160–174, 2019, doi: 10.2478/sbe-2019-0051.
D. Yu, D. F. Li, J. M. Merigó, and L. Fang, “Mapping development of linguistic decision making studies,†Journal of Intelligent and Fuzzy Systems, vol. 30, no. 5, pp. 2727–2736, 2016, doi: 10.3233/IFS-152026.
F. Afifi, N. B. Anuar, S. Shamshirband, and K.-K. R. Choo, “DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware,†Plos One, vol. 11, no. 9, pp. 1–21, 2016, doi: 10.1371/journal.pone.0162627.
J. Koskinen et al., “How to use bibliometric methods in evaluation of scientific research? An example from Finnish schizophrenia research,†Nordic Journal of Psychiatry, vol. 62, no. 2, pp. 136–143, 2008, doi: 10.1080/08039480801961667.
A. Abrizah, A. N. Zainab, K. Kiran, and R. G. Raj, “LIS journals scientific impact and subject categorization: A comparison between Web of Science and Scopus,†Scientometrics, vol. 94, no. 2, pp. 721–740, 2013, doi: 10.1007/s11192-012-0813-7.
J. Mingers and L. Leydesdorff, “A review of theory and practice in scientometrics,†European Journal of Operational Research, vol. 246, no. 1, pp. 1–19, 2015, doi: 10.1016/j.ejor.2015.04.002.
P. Mongeon and A. Paul-Hus, “The journal coverage of Web of Science and Scopus: a comparative analysis,†Scientometrics, vol. 106, no. 1, pp. 213–228, 2016, doi: 10.1007/s11192-015-1765-5.
M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘“malwareâ€â€™: Bibliometric analysis of malware study,†Journal of Network and Computer Applications, vol. 75, pp. 58–76, 2016, doi: 10.1016/j.jnca.2016.08.022.
C. López-Illescas, F. de Moya-Anegón, and H. F. Moed, “Coverage and citation impact of oncological journals in the Web of Science and Scopus,†Journal of Informetrics, vol. 2, no. 4, pp. 304–316, 2008, doi: 10.1016/j.joi.2008.08.001.
J. Grimm, “Users, narcissism and control – tracking the impact of scholarly publications in the 21st century,†World Statistics on Mining and Utilities 2018, p. 50, 2012, doi: 10.4337/9781788974585.00003.
M. Clermont and H. Dyckhoff, “Coverage of Business Administration Literature in Google Scholar: Analysis and Comparison with Econbiz, Scopus and Web of Science,†SSRN Electronic Journal, pp. 1–54, 2012, doi: 10.2139/ssrn.2016850.
P. H. C. Chabot, “What is Tableau?,†2021. .
M. Aria and C. Cuccurullo, “bibliometrix: An R-tool for comprehensive science mapping analysis,†Journal of Informetrics, vol. 11, no. 4, pp. 959–975, 2017, doi: 10.1016/j.joi.2017.08.007.
H. A. Parhusip, B. Susanto, L. Linawati, S. Trihandaru, Y. Sardjono, and A. S. Mugirahayu, “Classification Breast Cancer Revisited with Machine Learning,†International Journal on Data Science (IJODS), vol. 1, no. 1, pp. 42–50, 2020, doi: 10.18517/ijods.1.1.42-50.2020.
N. Mohd Hatta, Z. Ali Shah, and S. Kasim, “Evaluate the Performance of SVM Kernel Functions for Multiclass Cancer Classification,†International Journal on Data Science (IJODS), vol. 1, no. 1, pp. 37–41, 2020, doi: 10.18517/ijods.1.1.37-41.2020.
M. Sajjad, M. Pasha, and U. Pasha, “Parametric Evaluation of E-Health Systems,†International Journal of Information Systems and Computer Technologies (IJISCT), vol. 1, no. January, pp. 31–37, 2022.
H. Ghous, M. H. Malik, M. Abbas, and M. Ismail, “Early Detection of Breast Cancer Tumors using Linear Discriminant Analysis Feature Selection with Different Machine Learning Classification Methods,†International Journal of Information Systems and Computer Technologies (IJISCT), vol. 1, no. 1, pp. 1–12, 2022, doi: 10.5121/cseij.2022.12117.
M. Sulistiyono, L. A. Wirasakti, and Y. Pristyanto, “The Effect of Adaptive Synthetic and Information Gain on C4. 5 and Naive Bayes in Imbalance Class Dataset,†International Journal of Advanced Science Computing and Engineering (IJASCE), vol. 4, no. 1, pp. 1–11, 2022.
S. K. Mohamed, N. A. Sakr, and N. A. Hikal, “A Review of Breast Cancer Classification and Detection Techniques,†International Journal of Advanced Science Computing and Engineering (IJASCE), vol. 3, no. 3, pp. 128–139, 2021.
E. Juma Adwan and B. Ali Alsaeed, “Cloud Computing adoption in the financial banking sector-A systematic litreture review (2011-2021),†International Journal of Advanced Science Computing and Engineering (IJASCE), vol. 4, no. 1, pp. 48–55, 2022.
N. Qadir and R. Ahmad, “Secrs Template To Aid Novice Developers in Security Requirements Identification and Documentation,†International Journal of Software Engineering and Computer Systems (IJSECS), vol. 8, no. 1, pp. 45–52, 2022, doi: 10.15282/ijsecs.8.1.2022.5.0095.
H. Chaudhary, H. Chaudhary, and A. Kumar Sharma, “Optimized Genetic Algorithm and Extended Diffie Hellman as an Effectual Approach for DOS-Attack Detection in Cloud,†International Journal of Software Engineering and Computer Systems (IJSECS), vol. 8, no. 1, pp. 69–78, 2022, doi: 10.15282/ijsecs.8.1.2022.7.0097.
M. F. A. Razak, N. B. Anuar, F. Othman, A. Firdaus, F. Afifi, and R. Salleh, “Bio-inspired for Features Optimization and Malware Detection,†Arabian Journal for Science and Engineering, vol. 43, no. 12, pp. 6963–6979, 2017, doi: 10.1007/s13369-017-2951-y.
S. Y. Yerima, S. Sezer, G. McWilliams, and I. Muttik, “A New Android Malware Detection Approach Using Bayesian Classification,†in IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, Mar. 2013, pp. 121–128, doi: 10.1109/AINA.2013.88.
S. Y. Yerima, S. Sezer, and I. Muttik, “Android malware detection: An eigenspace analysis approach,†2015 Science and Information Conference (SAI), pp. 1236–1242, 2015, doi: 10.1109/SAI.2015.7237302.
R. Jusoh, A. Firdaus, S. Anwar, M. Z. Osman, M. F. Darmawan, and M. F. Ab Razak, “Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation),†PeerJ Computer Science, vol. 7, no. e522, pp. 1–54, 2021, doi: 10.7717/peerj-cs.522.
C. A. Che Yahaya, A. Firdaus, S. Mohamad, F. Ernawan, and M. F. A. Razak, “Automated Feature Selection using Boruta Algorithm to Detect Mobile Malware,†International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 5, pp. 9029–9036, 2020, doi: 10.30534/ijatcse/2020/307952020.