On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors