Fig. 4
From: Detecting stealthy attacks against industrial control systems based on residual skewness analysis

The sequence replacement procedure
From: Detecting stealthy attacks against industrial control systems based on residual skewness analysis

The sequence replacement procedure