Skip to main content
. 2024 Feb 9;24(4):1148. doi: 10.3390/s24041148

Table 2.

Mathematical representation of cyber attack vectors.

f1xt=α×xt, α= random0.10.8
f2xt=0,38xt43xt,otherwise
f3xt=λt×xt,λt= random0.10.8
f4xt=0,xtλt<0xtλt,otherwise     λt=random0.1,maxX
f5xt=xtmean(X),xtmean(X)0xt,otherwise
f6xt=x(49t),t=1,2,3,,48