From: On the use of watermark-based schemes to detect cyber-physical attacks
Attack name
References
Replay attack
[5,47,48]
Dynamic false-data injection attack
[35,49]
Stealth / false-data injection attack (bias, surge, geometric)
[48,50 – 53]
Covert attack
[16,54]