resilient control, cyber attacks, input saturation, denial of service attack, fuzzy model based control framework