“…As shown in [10], when the attacker uses the complete knowledge of the system and perform replay attack on all the actuators and sensors used by the detector, attack detection is not possible. For example, in [10], the authors showed that the powerful attack in which the attacker compromises all sensor and actuators was not detected and the attacker was successful in hiding the attack. As shown in Figure 6 the residual signal for two pressure sensor measurements namely, 2_PIT_001 and 2_PIT_002, stays within the upper and lower threshold of a CUSUM detector.…”