Vulnerability Of Cyber-Physical Systems To Optimal Stealthy Deterministic Attack Strategies