Recovery after attacks of deception on Networked Control Systems | IEEE Conference Publication | IEEE Xplore