Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems | IEEE Journals & Magazine | IEEE Xplore