Fig. 4From: Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systemsThe TEC of final local estimate for the eavesdropperBack to article page