Research Article

A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property

Figure 9

Attack detection results for several χ in systems of Example 2. (a) Residue signal for . (b) Residue signal for .
(a)
(b)