Fig. 13From: A controller design for mitigation of passive system identification attacks in networked control systemsHistogram of the settling time when using the proposed countermeasureBack to article page