“…In order to identify the potential cyber-risks from this embedded software, the recognition approaches can be grouped into scanning tools, online surveys, participators interviews, introducing threats and simulation, conception and elaboration method and attack graph generation, as well as the cyber-attack path discovery method (Balduzzi et al, 2014;Kalogeraki et al, 2018b;Lee and Wogan, 2018;Möller et al, 2018;Mouratidis and Diamantopoulou, 2018;Polatidis et al, 2018;Jacq et al, 2019a;Tam and Jones, 2019b). For example, we can use the industry-leading vulnerability scanning tool (i.e.…”