Fig. 5From: Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systemsTFEC with different trigger thresholdsBack to article page