EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector Apr 8, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Apr 7, 2022 Intrusion Detection
— Unverified 0Towards Explainable Meta-Learning for DDoS Detection Apr 5, 2022 Intrusion Detection Meta-Learning
— Unverified 0Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks Apr 1, 2022 Generative Adversarial Network Intrusion Detection
— Unverified 0IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset Mar 30, 2022 Anomaly Detection feature selection
— Unverified 0Collaborative Learning for Cyberattack Detection in Blockchain Networks Mar 21, 2022 Intrusion Detection
— Unverified 0FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic Mar 21, 2022 Anomaly Detection Intrusion Detection
— Unverified 0The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems Mar 9, 2022 BIG-bench Machine Learning Intrusion Detection
Code Code Available 0Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection Mar 8, 2022 Intrusion Detection valid
— Unverified 0Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection Feb 28, 2022 Benchmarking Intrusion Detection
— Unverified 0Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations Feb 24, 2022 Anomaly Detection BIG-bench Machine Learning
— Unverified 0NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks Feb 20, 2022 Data Augmentation Intrusion Detection
— Unverified 0Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things Feb 19, 2022 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Trustworthy Anomaly Detection: A Survey Feb 15, 2022 Anomaly Detection Fairness
— Unverified 0Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection Feb 2, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks Jan 31, 2022 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Early Detection of Network Attacks Using Deep Learning Jan 27, 2022 Deep Learning feature selection
— Unverified 0One-Shot Learning on Attributed Sequences Jan 23, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots Jan 14, 2022 Intrusion Detection Management
— Unverified 0An Interpretable Federated Learning-based Network Intrusion Detection Framework Jan 10, 2022 Federated Learning Intrusion Detection
— Unverified 0Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification Jan 3, 2022 feature selection Intrusion Detection
— Unverified 0Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems Dec 22, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0A Heterogeneous Graph Learning Model for Cyber-Attack Detection Dec 16, 2021 Cyber Attack Detection Graph Learning
— Unverified 0Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Dec 14, 2021 Anomaly Detection Explainable artificial intelligence
— Unverified 0Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review Dec 6, 2021 BIG-bench Machine Learning Feature Engineering
— Unverified 0Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System Dec 3, 2021 Feature Engineering Intrusion Detection
— Unverified 0Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration Dec 2, 2021 Intrusion Detection Network Intrusion Detection
— Unverified 0Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks Dec 2, 2021 Federated Learning Intrusion Detection
— Unverified 0Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection Nov 27, 2021 Intrusion Detection Network Intrusion Detection
Code Code Available 0A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection Nov 25, 2021 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach Nov 20, 2021 feature selection Intrusion Detection
Code Code Available 0A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System Nov 19, 2021 Intrusion Detection
— Unverified 0A Dynamic Watermarking Algorithm for Finite Markov Decision Problems Nov 9, 2021 Intrusion Detection Sensitivity
— Unverified 0A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection Nov 4, 2021 Federated Learning Intrusion Detection
— Unverified 0Intrusion Detection: Machine Learning Baseline Calculations for Image Classification Nov 3, 2021 BIG-bench Machine Learning Classification
— Unverified 0A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks Nov 2, 2021 Edge-computing Intrusion Detection
— Unverified 0Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold Oct 31, 2021 Intrusion Detection
— Unverified 0Orthogonal variance-based feature selection for intrusion detection systems Oct 25, 2021 feature selection Intrusion Detection
— Unverified 0A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods Oct 15, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks Oct 6, 2021 Generative Adversarial Network Intrusion Detection
— Unverified 0An Efficient Anomaly Detection Approach using Cube Sampling with Streaming Data Oct 5, 2021 Anomaly Detection Event Detection
— Unverified 0Automating Privilege Escalation with Deep Reinforcement Learning Oct 4, 2021 BIG-bench Machine Learning Deep Reinforcement Learning
— Unverified 0From Zero-Shot Machine Learning to Zero-Day Attack Detection Sep 30, 2021 Attribute BIG-bench Machine Learning
— Unverified 0Evaluating the Robustness of Time Series Anomaly and Intrusion Detection Methods against Adversarial Attacks Sep 29, 2021 Intrusion Detection Time Series
— Unverified 0LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach Sep 23, 2021 Intrusion Detection Language Modeling
— Unverified 0A Novel Online Incremental Learning Intrusion Prevention System Sep 20, 2021 Incremental Learning Intrusion Detection
— Unverified 0Modern Cybersecurity Solution using Supervised Machine Learning Sep 15, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Integrating Sensing and Communication in Cellular Networks via NR Sidelink Sep 15, 2021 Gesture Recognition Intrusion Detection
— Unverified 0Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Sep 6, 2021 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Feature Analysis for Machine Learning-based IoT Intrusion Detection Aug 29, 2021 Computational Efficiency feature selection
— Unverified 0