Fig. 14From: A controller design for mitigation of passive system identification attacks in networked control systemsResults of an SD-Controlled Data Injection attack in a system with the proposed countermeasureBack to article page