Figure 3From: Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacksThe random cyber-attack scenario for each node \(\gamma _{i}(t)\)Back to article page