“…Computer systems monitor and control a myriad of physical processes, and their protection against random errors, deliberate intrusions (e.g., Denning, 1987;Debar et al, 1999;Cárdenas et al, 2011;Premathilaka et al, 2013; and references therein), false data injections (e.g., Liang, 2017; and references therein), and other disruptors has become of much interest. A number of sophisticated methods have been suggested in the literature for tackling such problems, including probabilistic (e.g., Huang et al, 2016;Onoda, 2016), deep learning (e.g., He et al, 2017), and artificial neural networks based methods (e.g., Potluri, 2017), to name a few.…”