A Detection-Estimation Strategy for Delayed Systems under Spoofing Attack | IEEE Conference Publication | IEEE Xplore