“…References Surveyed and SLR (Secondary study) [11], [105], [30], [72], [26], [102], [39], [137], [141], [22], [7], [12], [58], [171] Primary Study [18], [49], [126], [94], [132], [10], [174], [74], [149], [29] Grey Literature [143], [51], [132], [34], [43], [128] and to which components? There are various strategies that can be used to investigate ways in which blockchain-based systems may be threatened.…”