“…The greater the size, the greater the number of research papers identified. The solutions addressing different threats focused on design, implementation, security analysis, and security assurance frameworks [13,24,32,50,67,[80][81][82][83][84]; systems for security assurance [47], intrusion detection [29] and security incident management [85]; approaches/mechanisms for security [7,25,28,40,41,43,45,48,[86][87][88][89][90][91] and remote diagnostics [92]; schemes for security assurance [72,73,[93][94][95]; protocols for security assurance [8,16,39,53,62,63,[96][97][98][99][100][101]; algorithms for security assurance [102]; models/algorithms for securi...…”