Fig. 4From: A controller design for mitigation of passive system identification attacks in networked control systemsMean estimated coefficients of G(z) and C1(z), in face of different rates of sample loss [12]. a g1 of G(z). b g2 of G(z). c g3 of G(z). d g4 of G(z). e c1,1 of C1(z). f c2,1 of C1(z)Back to article page