1 5 System State Estimation 3 6 Detection 1 7 Filtering 2 8 Design 1 9 Cyber Attack Detection 1Regular meetings between students and mentors were conducted virtually using the College’s officialcourse meeting platform. Here are some general observations from the groups’ approaches: Initially, students met with their advisors daily to get introduced to the problems, software, online coding platforms, and data that they would be using. Table 2 summarizes detailed