Research Article

A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries

Figure 4

The number of attacked sensors at each moment when .