“…In fact, also if we consider CPS dealing with cyber attacks with a generic dynamical systems modeling framework only, a huge amount of works can be found, as for example Bai et al, 2017a;Chen et al, 2018b;Pajic et al, 2017b;Ding et al, 2017b;2017a;Zheng et al, 2016;Yuan et al, 2016;Mo and Sinopoli, 2016;Chen et al, 2017b;Jin et al, 2017;Kung et al, 2017 ), just to cite a few. Another large amount of works can be found if we only focus our attention on attack detection and identification, and state estimation ( Nakahira and Mo, 2018;Mo and Garone, 2016;Weerakkody et al, 2017;Bai et al, 2017b;Mishra et al, 2017;Murguia and Ruths, 2016;Li et al, 2017c;2017d;Chen et al, 2017a;Shi et al, 2017;Shoukry et al, 2018;Pajic et al, 2017a;Shoukry and Tabuada, 2016;Ao et al, 2018;Lee et al, 2018;Forti et al, 2018;Kim et al, 2018 ). It is worth to emphasize that one of the path followed by researcher to improve the research in CPS security consists on considering more accurate, but also more complex, models such as stochastic, nonlinear and delayed systems ( Ding et al, 2018b;Hu et al, 2016;Liu et al, 2016a;Wang et al, 2017 ).…”