Fig. 2From: On the use of watermark-based schemes to detect cyber-physical attacksOverall control system equipped with the watermark-based detection scheme in [4, 5]Back to article page