security protection; cyber security; DI attacks; secure estimation; adaptive switching counteraction