Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review

Full metadata record
DC Field Value Language
dc.contributor.authorHan, Mee Lan-
dc.contributor.authorKwak, Byung Il-
dc.contributor.authorKim, Huy Kang-
dc.date.accessioned2022-06-12T06:41:06Z-
dc.date.available2022-06-12T06:41:06Z-
dc.date.created2022-06-10-
dc.date.issued2022-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/142114-
dc.description.abstractRecently, despite massively multiplayer online role-playing game (MMORPG) based on the PC implementation environment in mobile games, related fraudulent and illegal activities are still prevalent in response to the extension and diversity of the online gaming market. For game users who enjoy the game as leisure or cultural content, these issues inhibit the game's immersion or cause seceding from the game, thus negatively affecting the overall online gaming industry. This systematic review provides an overview of substantial studies on the occurrence of cheating behavior, countermeasures, and detection methods. We aimed to scrutinize the scope of generable cheating behavior due to the structural characteristics of a stateful game server. Furthermore, we focused on providing the basis for the key mechanisms of online games based on the conceptual attributes of the MMORPG. A comprehensive literature research was conducted, and the classification of countermeasures and detection methods were systematized. The results of the systematic literature review contribute to the current understanding of how to correctly manage detection techniques and methods for cheating behavior in the MMORPG.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectBOT DETECTION-
dc.titleCheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.1109/ACCESS.2022.3172110-
dc.identifier.scopusid2-s2.0-85129605287-
dc.identifier.wosid000797411000001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.49050 - 49063-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.citation.startPage49050-
dc.citation.endPage49063-
dc.type.rimsART-
dc.type.docTypeReview-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusBOT DETECTION-
dc.subject.keywordAuthorGames-
dc.subject.keywordAuthorServers-
dc.subject.keywordAuthorReal-time systems-
dc.subject.keywordAuthorCodes-
dc.subject.keywordAuthorComputer crime-
dc.subject.keywordAuthorSystematics-
dc.subject.keywordAuthorLicenses-
dc.subject.keywordAuthorMMORPG-
dc.subject.keywordAuthorcheating-
dc.subject.keywordAuthoranomaly detection-
dc.subject.keywordAuthorcountermeasure-
dc.subject.keywordAuthordetection method-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE