Skip to main content
Fig. 12 | EURASIP Journal on Information Security

Fig. 12

From: On the use of watermark-based schemes to detect cyber-physical attacks

Fig. 12

Numeric simulation results using the single- and multi-watermark detection schemes with the same performance loss, and different adversary window size for eavesdropping the data channel before the attack. The order used by the adversary is the correct system order, p = 25 a Detection ratio for the single-watermark approach. b Detection ratio for the multi-watermark approach. a Detection ratio function with respect to the single-watermark against a parametric cyber-physical adversary using different adversary window sizes for eavesdropping the data of the channel before the attack. b Detection ratio function with respect to the multi-watermark against a parametric cyber-physical adversary using different adversary window sizes for eavesdropping the data of the channel before the attack

Back to article page