Covert attack on a discrete-time system with limited use of the available disruption resources | IEEE Conference Publication | IEEE Xplore