Fig. 2From: A controller design for mitigation of passive system identification attacks in networked control systemsClassification and requirements of cyber-physical attacks in NCSsBack to article page