Identifying cyber attacks via local model information | IEEE Conference Publication | IEEE Xplore