cyber-attack-resilient control techniques