Figure 1From: Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacksThe error trajectories with controller (4) under cyber-attacks \(e(t)\)Back to article page