Fig. 2From: Software control and intellectual property protection in cyber-physical systemsProposed fingerprinting protocolBack to article page