上一条: Opacity of Networked Supervisory Control Systems over Insecure Communication Channels
下一条: Verification and enforcement of strong infinite- and k-step opacity using state recognizers