“…Confidentiality [53] Availability [37]- [40], [44], [45], [49]- [55], [59], [60], [69], [70], [74], [77], [81], [84], [94], [98] Integrity [36], [46], [48], [52], [68], [76], [82], [91]- [93] Privacy [42], [51], [54], [64], [72], [75], [78], [80] Authentication [41]- [43], [46], [49], [53], [55]- [60] Trust [61]- [63], [65]- [67], [71], [79], [95], [96] This survey centers around the use of ML in achieving the above security requirements. As shown in Fig.…”