Fig. 4From: Detecting stealthy attacks against industrial control systems based on residual skewness analysisThe sequence replacement procedureBack to article page