Fig. 3From: A controller design for mitigation of passive system identification attacks in networked control systemsMitM attack [12]Back to article page