Research Article

A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property

Figure 6

Simulation results of false data injection attack. (a) Reference and corrupted output. (b) Residue signal.
(a)
(b)