Fig. 13From: On the use of watermark-based schemes to detect cyber-physical attacksAbstract architecture overviewBack to article page