Abstract
Components are the significant part of a system which plays an important role in the functionality of the system. Components are the reusable part of a system which are already tested, debugged, and experienced based on the previous practices. A new system is developed based on the reusable components, as reusability of components is recommended to save time, effort, and resources as such components are already made. Security of components is a significant constituent of the system to maintain the existence of the component as well as the system to function smoothly. Component security can protect a component from illegal access and changing its contents. Considering the developments in information security, protecting the components becomes a fundamental issue. In order to tackle such issues, a comprehensive study report is needed which can help practitioners to protect their system. The current study is an endeavor to report some of the existing studies regarding component security evaluation based on multicriteria decision and machine learning algorithms in the popular searching libraries.
Highlights
Technology has made life easier but has exposed several security issues
Technology plays an inevitable role in human life. e Internet of ings (IoT) enables communication with different devices. e smart devices are connected to communicate, process, compute, and monitor diverse real-time scenarios. e devices are normally heterogeneous and have low memory and short power for processing. e concept of Internet of ings came with the challenges of privacy and security, as the conventional security protocol does not fit the devices of IoT. e information security of an organization is highly dependent on different types of information of the organization
Different studies are available for the security purpose [1,2,3,4,5]. e algorithms of ML have shown a considerable performance in different application fields such facial recognition, text recognition, spam detection, and so on. e applications of machine learning (ML) algorithms are obvious in different domain areas [2, 5,6,7,8,9,10,11]
Summary
Ese perspectives include the publication name where the paper is published, publication types, proceedings, media format, and many others. E Springer library was searched to show the relevant materials published for the given query and keywords.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.