{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:06:02Z","timestamp":1770966362022,"version":"3.50.1"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,10]]},"abstract":"<jats:p>Components are the significant part of a system which plays an important role in the functionality of the system. Components are the reusable part of a system which are already tested, debugged, and experienced based on the previous practices. A new system is developed based on the reusable components, as reusability of components is recommended to save time, effort, and resources as such components are already made. Security of components is a significant constituent of the system to maintain the existence of the component as well as the system to function smoothly. Component security can protect a component from illegal access and changing its contents. Considering the developments in information security, protecting the components becomes a fundamental issue. In order to tackle such issues, a comprehensive study report is needed which can help practitioners to protect their system. The current study is an endeavor to report some of the existing studies regarding component security evaluation based on multicriteria decision and machine learning algorithms in the popular searching libraries.<\/jats:p>","DOI":"10.1155\/2020\/8886877","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T23:35:50Z","timestamp":1599780950000},"page":"1-14","source":"Crossref","is-referenced-by-count":16,"title":["Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2348-0070","authenticated-orcid":true,"given":"Jibin","family":"Zhang","sequence":"first","affiliation":[{"name":"Materials Corporation of Petro China Southwest Oil & Gasfield Company, Chengdu 610017, China"}]},{"given":"Shah","family":"Nazir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swabi, Swabi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2891-1423","authenticated-orcid":true,"given":"Ansheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Materials Corporation of Petro China Southwest Oil & Gasfield Company, Chengdu 610017, China"}]},{"given":"Abdullah","family":"Alharbi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100227"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101747"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.053"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.133"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.136"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.091"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.016"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2019.133817"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.07.007"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.05.018"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.009"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.007"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.1266"},{"key":"25","volume":"2020","year":"2020","journal-title":"Security and Communication Networks"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6132312"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3006358"},{"key":"29","first-page":"1","volume":"15","year":"2015","journal-title":"International Arab Journal of Information and Technology"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8886877.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8886877.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8886877.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T23:35:52Z","timestamp":1599780952000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8886877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":22,"alternative-id":["8886877","8886877"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8886877","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,10]]}}}