Fig. 8From: A controller design for mitigation of passive system identification attacks in networked control systemsPDF of p12 and p21Back to article page