Research Article

A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries

Figure 5

Comparison of the state estimation with different thresholds.