Research Article

Security-Based Asynchronous Control for Discrete-Time Markov Switching Power Systems

Figure 8

Curve of control input with deception attacks.