SEARCH Articles Figures Tables System component System vulnerabilities Systems and Components Systems investigated Vulnerability