Cyber physical attacks with control objectives and detection constraints | IEEE Conference Publication | IEEE Xplore