Isolation of Integrity Attacks in Cyber-Physical Systems