Text this: Identification of system vulnerability under a smart sensor attack via attack model reduction

  _  _     ______   __   __   _    _    __   _   
 | \| ||  /_   _//  \ \\/ // | || | || | || | || 
 |  ' ||   -| ||-    \   //  | || | || | '--' || 
 | .  ||   _| ||_    / . \\  | \\_/ || | .--. || 
 |_|\_||  /_____//  /_//\_\\  \____//  |_|| |_|| 
 `-` -`   `-----`   `-`  --`   `---`   `-`  `-`