Return to Article Details System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems Download Download PDF