Research Article

A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries

Figure 1

The networked system under attacks.