Research Article
A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property
Figure 8
Attack detection results for several χ in systems of Example 1. (a) Residue signal for . (b) Residue signal for . (c) Residue signal for .
(a) |
(b) |
(c) |