Monitoring of stealthy attack in networked control systems | IEEE Conference Publication | IEEE Xplore