Revealing stealthy attacks in control systems | IEEE Conference Publication | IEEE Xplore