Research Article

A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property

Figure 8

Attack detection results for several χ in systems of Example 1. (a) Residue signal for . (b) Residue signal for . (c) Residue signal for .
(a)
(b)
(c)