Abstract: A stealthy cyberattack (SCA) aims to gradually drive the system toward instability. Although research is continuing in attack detection algorithms, a resilient control strategy is vital if ...