“…As shown in Figure 4 , most researchers of this domain are proposing an approach or a methodology based on an already existing method or tool, that is, 41 out of 143 publications. 26 , 28 , 33 , 34 , 35 , 36 , 40 , 41 , 46 , 47 , 48 , 51 , 52 , 53 , 56 , 58 , 59 , 61 , 62 , 63 , 64 , 65 , 66 , 68 , 71 , 72 , 74 , 78 , 82 , 86 , 87 , 93 , 95 , 97 , 98 , 102 , 114 , 121 , 126 , 135 , 136 Their aim was to adapt an existing technology in such a way that it becomes exploitable for MDE of safety and security systems.…”