Skip to main content
Fig. 11 | Journal of Internet Services and Applications

Fig. 11

From: A controller design for mitigation of passive system identification attacks in networked control systems

Fig. 11

Zeros and poles estimated by the Passive System Identification attack for smaller monitoring periods T (without a switching event during T). a Identifying C1 with T=0.2s starting at t=0. b Identifying C2 with T=0.2s starting at the first switching event. c Identifying C1 with T=0.4s starting at t=0. d Identifying C2 with T=0.4s starting at the first switching event. e Identifying C1 with T=0.6s starting at t=0. f Identifying C2 with T=0.6s starting at the first switching event. g Identifying C1 with T=0.8s starting at t=0. h Identifying C2 with T=0.8s starting at the first switching event. i Identifying C1 with T=1.0s starting at t=0. j Identifying C2 with T=1.0s starting at the first switching event. k Identifying C1 with T=1.2s starting at t=0. l Identifying C2 with T=1.2s starting at the first switching event

Back to article page