Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems | IEEE Journals & Magazine | IEEE Xplore