Fig. 6From: A controller design for mitigation of passive system identification attacks in networked control systemsNCS with a switching controllerBack to article page