Cyber-physical systems (CPS) have been increasingly attacked by hackers. Recent studies have shown that CPS are especially vulnerable to insider attacks, in which case the attacker has full knowledge of the systems configuration. To better prevent such types of attacks, we need to understand how insider attacks are generated. Typically, there are three critical aspects for a successful insider attack: (i) Maximize damage, (ii) Avoid detection and (iii) Minimize the attack cost.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Michael Biehler, Zhen Zhong, Jianjun Shi, "SAGE: Stealthy Attack GEneration", IEEE Dataport, 2021. [Online]. Available: http://dx.doi.org/10.21227/08yr-j129. Accessed: Mar. 22, 2025.
@data{08yr-j129-21,
doi = {10.21227/08yr-j129},
url = {http://dx.doi.org/10.21227/08yr-j129},
author = {Michael Biehler; Zhen Zhong; Jianjun Shi },
publisher = {IEEE Dataport},
title = {SAGE: Stealthy Attack GEneration},
year = {2021} }
TY - DATA
T1 - SAGE: Stealthy Attack GEneration
AU - Michael Biehler; Zhen Zhong; Jianjun Shi
PY - 2021
PB - IEEE Dataport
UR - 10.21227/08yr-j129
ER -
Michael Biehler, Zhen Zhong, Jianjun Shi. (2021). SAGE: Stealthy Attack GEneration. IEEE Dataport. http://dx.doi.org/10.21227/08yr-j129
Michael Biehler, Zhen Zhong, Jianjun Shi, 2021. SAGE: Stealthy Attack GEneration. Available at: http://dx.doi.org/10.21227/08yr-j129.
Michael Biehler, Zhen Zhong, Jianjun Shi. (2021). "SAGE: Stealthy Attack GEneration." Web.
1. Michael Biehler, Zhen Zhong, Jianjun Shi. SAGE: Stealthy Attack GEneration [Internet]. IEEE Dataport; 2021. Available from : http://dx.doi.org/10.21227/08yr-j129
Michael Biehler, Zhen Zhong, Jianjun Shi. "SAGE: Stealthy Attack GEneration." doi: 10.21227/08yr-j129