Fig. 2From: Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systemsThe TEC of final local estimates without event triggersBack to article page