Fig. 11From: Detecting stealthy attacks against industrial control systems based on residual skewness analysisDetection time comparison of two different approaches, (a) the residual permutation entropy-based approach and (b) the residual skewness analysis-based approach. The blue points are observed computing time and the red lines are fitted lines for the blue pointsBack to article page