“…As compared to the conventional event-triggered schemes [22]- [23], attack detection criterion are used as triggering mechanisms for the proposed countermeasures to operate immediately [24]- [25]. As already discussed in [14], [15], since stealth attacks involve compromised sensors, actuators and communication links, activation of these events is defined using the detection criteria for each unit. Further, the activation status of these events in the attacked agent is also transmitted to non-compromised neighbors to authenticate the transmitted measurements as False.…”