“…They also embed the problems identified in the previous point [ 30 , 31 ]. These models show a wider range of CS problems than other consolidated MDs [ 57 , 58 , 59 , 60 , 61 , 62 ]. - Cyber ATTACKs applicable on the CRs, and the related impact, have been identified and categorized into three groups [ 21 ] concerning hardware [ 63 , 64 ], firmware [ 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 73 ], and communication [ 74 , 75 , 76 , 77 ].
…”