A Polynomial Approach to Verifying the Existence of a Threatening Sensor Attacker | IEEE Journals & Magazine | IEEE Xplore