Figure 3: Attack detection curve together based on the proposed fuzzy attack detection/isolation fusion framework.