Input Design for Active Dectection of Integrity Attacks using Set-based Approach | Publicación