A cyber attack model with bounded sensor reading alterations | IEEE Conference Publication | IEEE Xplore