“…In particular, this article focuses on secure control against deception attacks, which, while attracting growing interest, is still in an early stage. On this subject, most approaches for mitigating deception attacks are based on the assumption that some sensors/actuators are not compromised (sparse attacks) [14]- [16], in exploiting the analytical redundancy obtained in the context of distributed systems [4], [7], [17], [18] or in the use of stochastic models with known distribution parameters for modeling the attacks [19]- [22]. Whereas the above approaches are efficient under the proposed assumptions, the real attacker behavior may be incompatible with those attack models and/or the safe redundancy may be unavailable.…”