KPA in CPS

\label{sec:sysid}

In this section, we shall first apply closed-loop system identification technique to the CPS and investigate the identifiability condition of \(\mathcal{G}(z)\) and \(\mathcal{K}(z)\) in Section \ref{sec:idGK}. A stealthy attack which is enabled by KPA is discussed in Section \ref{sec:stealthy}.