On Cyber-Physical Forensics, Attacks, and Defenses