“…We consider the presence of misbehaving sensors and actuators, which could be acting according to different types of failures such as outages [16], partial degradation and loss of effectiveness [17], incipient faults [24], or even controlled by malicious cyber adversaries [25], [26]. Furthermore, we suppose that misbehaving devices are detected and isolated using suitable FDD schemes [1], [10], [12], after which they are removed from the system.…”