IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach

Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach
View Sample PDF
Author(s): Santosh Kumar Smmarwar (National Institute of Technology, Raipur, India), Govind P. Gupta (National Institute of Technology, Raipur, India)and Sanjay Kumar (National Institute of Technology, Raipur, India)
Copyright: 2022
Pages: 22
Source title: Advances in Malware and Data-Driven Network Security
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-7789-9.ch002

Purchase

View Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach on the publisher's website for pricing and purchasing information.

Abstract

With more uses of internet-based services, the risk of cyberattacks is growing continuously. To analyze these research trends for malware and intrusion detection, the authors applied the topic modeling approach in the study by using the LDA (latent dirichlet allocation) and calculating the maximum and minimum probability of the words, which appears in the large collection of text. The LDA technique is useful in finding the hidden topics for further research in the areas of network and cybersecurity. In this chapter, they collected the abstract of two thousand papers from the Scopus library from 2014 to 2021. These collected papers are from reputed publications such as Elsevier, Springer, and IEEE Transactions. The main aim of this study is to find research trends based on keywords that are untouched or on which less research work has been done. To the best of the authors' knowledge, this will be the first study done by using the LDA technique for topic modeling in the areas of network security to demonstrate the research gap and trends for malware and intrusion detection systems.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom