Research Article

A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries

Figure 7

The actual states and its remote estimation based on different methods.