Fig. 10From: A controller design for mitigation of passive system identification attacks in networked control systemsZeros and poles estimated by the Passive System Identification attack. a Using the non-switching controller. b Using the switching controllerBack to article page