Fig. 3From: Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systemsThe TFEC without event triggersBack to article page