Fig. 1From: Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systemsBlock diagram of the system modelBack to article page