... Such attacks can include information flooding to increase equipment latency and induce physical illness, planting real-world objects to overwhelm displays, subverting a personal area network to sow confusion, injecting virtual data to distract personnel, using objects to overwhelm a user with confusing false alarms, assessing user status through an eye tracker, and other potential attacks. ...