Fig. 1From: On the use of watermark-based schemes to detect cyber-physical attacksSample representation of a cyber-physical attack against a networked-control systemBack to article page