published in Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges Book