Figure 2From: Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacksThe applied control signals for each node under cyber-attacks \(u_{i}(t)\)Back to article page