CyberRAG: An agentic RAG cyber attack classification and reporting tool Jul 3, 2025 Intrusion Detection RAG
— Unverified 0Detection of Cyber Attack in Network using Machine Learning Techniques. Jul 2, 2025 Intrusion Detection
— Unverified 0Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks Jun 26, 2025 Anomaly Detection Generative Adversarial Network
— Unverified 0Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis Jun 25, 2025 Adversarial Attack Intrusion Detection
— Unverified 0KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Jun 24, 2025 Intrusion Detection Knowledge Graphs
— Unverified 0Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Jun 23, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT Jun 22, 2025 Computational Efficiency Data Augmentation
— Unverified 0On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.0 Jun 19, 2025 Intrusion Detection
— Unverified 0A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method Jun 13, 2025 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation Jun 12, 2025 Intrusion Detection
— Unverified 0Are Trees Really Green? A Detection Approach of IoT Malware Attacks Jun 9, 2025 Intrusion Detection Privacy Preserving
— Unverified 0Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning Jun 7, 2025 Federated Learning Intrusion Detection
— Unverified 0Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning Jun 4, 2025 Clustering Intrusion Detection
— Unverified 0A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Jun 3, 2025 Intrusion Detection
— Unverified 0A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT May 31, 2025 feature selection Intrusion Detection
— Unverified 0INSIGHT: A Survey of In-Network Systems for Intelligent, High-Efficiency AI and Topology Optimization May 30, 2025 Federated Learning Intrusion Detection
— Unverified 0Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications May 26, 2025 Adversarial Robustness Intrusion Detection
— Unverified 0A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT Systems May 23, 2025 Intrusion Detection Network Intrusion Detection
Code Code Available 0A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles May 22, 2025 feature selection Intrusion Detection
— Unverified 0Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions May 21, 2025 Anomaly Detection Autonomous Vehicles
— Unverified 0SecCAN: An Extended CAN Controller with Embedded Intrusion Detection May 20, 2025 Intrusion Detection
Code Code Available 0CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data May 20, 2025 Binary Classification Decision Making
— Unverified 0Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge May 20, 2025 Intrusion Detection Network Pruning
Code Code Available 0A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network May 15, 2025 Autonomous Vehicles Federated Learning
— Unverified 0Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning May 13, 2025 Deep Reinforcement Learning Intrusion Detection
— Unverified 0Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection Systems May 12, 2025 Anomaly Detection Contrastive Learning
Code Code Available 0Simultaneous Intrusion Detection and Localization Using ISAC Network May 12, 2025 Intrusion Detection ISAC
— Unverified 0Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced Datasets May 7, 2025 Anomaly Detection Binary Classification
Code Code Available 0Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems May 6, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability May 2, 2025 Adversarial Attack Intrusion Detection
— Unverified 0Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking Apr 29, 2025 Benchmarking Intrusion Detection
— Unverified 0Smart Water Security with AI and Blockchain-Enhanced Digital Twins Apr 28, 2025 Intrusion Detection
— Unverified 0A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems Apr 28, 2025 Decision Making Intrusion Detection
— Unverified 0Simplified and Secure MCP Gateways for Enterprise AI Integration Apr 28, 2025 Intrusion Detection
Code Code Available 1Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization Apr 26, 2025 Autonomous Driving Autonomous Vehicles
— Unverified 0Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics Apr 24, 2025 Intrusion Detection
— Unverified 0Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security Apr 22, 2025 Anomaly Detection CPU
— Unverified 0FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection Apr 21, 2025 Feature Engineering Intrusion Detection
— Unverified 0Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs Apr 20, 2025 Intrusion Detection Scheduling
— Unverified 0Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security Apr 10, 2025 Intrusion Detection
— Unverified 0Deep Learning-based Intrusion Detection Systems: A Survey Apr 10, 2025 Deep Learning Intrusion Detection
— Unverified 0Hybrid Temporal Differential Consistency Autoencoder for Efficient and Sustainable Anomaly Detection in Cyber-Physical Systems Apr 8, 2025 Anomaly Detection Computational Efficiency
— Unverified 0WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems Apr 6, 2025 Federated Learning Intrusion Detection
— Unverified 0CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat Detection Apr 2, 2025 Federated Learning Intrusion Detection
Code Code Available 0Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries Apr 2, 2025 Benchmarking Computational Efficiency
— Unverified 0Integrated LLM-Based Intrusion Detection with Secure Slicing xApp for Securing O-RAN-Enabled Wireless Network Deployments Apr 1, 2025 Intrusion Detection
— Unverified 0Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems Mar 26, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture Mar 25, 2025 Intrusion Detection
— Unverified 0Payload-Aware Intrusion Detection with CMAE and Large Language Models Mar 23, 2025 Intrusion Detection Language Modeling
— Unverified 0Robust Intrusion Detection System with Explainable Artificial Intelligence Mar 7, 2025 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0