Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation | IEEE Journals & Magazine | IEEE Xplore