Fig. 12From: A controller design for mitigation of passive system identification attacks in networked control systemsResponse of the plant in the time domainBack to article page