Stealthy Attacks on Sampled-Data Control and Encryption-Based Countermeasures | IEEE Journals & Magazine | IEEE Xplore