Fig. 7From: A controller design for mitigation of passive system identification attacks in networked control systemsMarkov chain switching ruleBack to article page