Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks | IEEE Journals & Magazine | IEEE Xplore