The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV1095, author = {Che Akmal Che Yahaya and Ahmad Firdaus and Ferda Ernawan and Wan Isni Sofiah Wan Din}, title = {The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {6}, number = {2-2}, year = {2022}, keywords = {Root exploit; rootkit; bibliometric; security; detection; review.}, abstract = {Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malware are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malware and provides a mechanism for other malware to carry out malicious acts invisibly. In the interest to review the progress of root exploit efforts globally, there is a need to inspect all publications that involve root exploit. Among all malware reviews previously, to date, there is still no trace of any bibliometric analysis that demonstrates the research impacts of root exploit and trends in bibliometric analysis. Hence, this paper adopts bibliometric analysis specifically on root exploit studies which evaluate: (1) Wordcloud; (2) WordTreeMap; (3) Three fields plot; (4) Thematic evolution; (5) Thematic maps; (6) Correspondence analysis (CA); (7) Dendrogram; and (8) Multiple correspondence analysis (MCA). To conclude, our bibliometric discovers that; 1) Linux and Android become main interest in root exploit studies. 2) Types of root exploit in virtualization layer and studies to detect on this area are increasing. 3) USA and China have become the leaders in root exploit research. 4) Research studies are more towards memory forensics to detect root exploit, which is more promising. 5) Instead of researching new methods of root exploit in compromising victims, root exploit researchers were more focused on detecting root exploits.}, issn = {2549-9904}, pages = {489--497}, doi = {10.30630/joiv.6.2-2.1095}, url = {https://joiv.org/index.php/joiv/article/view/1095} }
Refworks Citation Data :
@article{{JOIV}{1095}, author = {Yahaya, C., Firdaus, A., Ernawan, F., Wan Din, W.}, title = {The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {6}, number = {2-2}, year = {2022}, doi = {10.30630/joiv.6.2-2.1095}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.