Research Article

A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries

Figure 2

The actual states and its remote estimation with different approaches.