Fig. 11From: A controller design for mitigation of passive system identification attacks in networked control systemsZeros and poles estimated by the Passive System Identification attack for smaller monitoring periods T (without a switching event during T). a Identifying C1 with T=0.2s starting at t=0. b Identifying C2 with T=0.2s starting at the first switching event. c Identifying C1 with T=0.4s starting at t=0. d Identifying C2 with T=0.4s starting at the first switching event. e Identifying C1 with T=0.6s starting at t=0. f Identifying C2 with T=0.6s starting at the first switching event. g Identifying C1 with T=0.8s starting at t=0. h Identifying C2 with T=0.8s starting at the first switching event. i Identifying C1 with T=1.0s starting at t=0. j Identifying C2 with T=1.0s starting at the first switching event. k Identifying C1 with T=1.2s starting at t=0. l Identifying C2 with T=1.2s starting at the first switching eventBack to article page