SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 501550 of 800 papers

TitleStatusHype
Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks0
End-To-End Anomaly Detection for Identifying Malicious Cyber Behavior through NLP-Based Log Embeddings0
GGNB: Graph-Based Gaussian Naive Bayes Intrusion Detection System for CAN Bus0
Online Dictionary Learning Based Fault and Cyber Attack Detection for Power Systems0
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks0
Learning to Detect: A Data-driven Approach for Network Intrusion Detection0
A new semi-supervised inductive transfer learning framework: Co-Transfer0
Jasmine: A New Active Learning Approach to Combat Cybercrime0
Intrusion Detection In Computer Networks Using Machine Learning AlgorithmsCode0
SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks0
HTTP2vec: Embedding of HTTP Requests for Detection of Anomalous Traffic0
Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges0
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks0
Decision-forest voting scheme for classification of rare classes in network intrusion detection0
Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks0
Segmented Federated Learning for Adaptive Intrusion Detection System0
Reinforcement Learning for Feedback-Enabled Cyber Resilience0
Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment0
Feature selection for intrusion detection systems0
Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach0
DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing0
Zero-shot learning approach to adaptive Cybersecurity using Explainable AI0
Artificial Neural Network for Cybersecurity: A Comprehensive Review0
Intrusion Detection and Localization for Networked Embedded Control Systems0
Detecting message modification attacks on the CAN bus with Temporal Convolutional NetworksCode0
Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions0
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection0
Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services0
A concise method for feature selection via normalized frequencies0
FlexParser -- the adaptive log file parser for continuous results in a changing world0
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm0
Performance Analysis of a Foreground Segmentation Neural Network Model0
Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model0
Cybersecurity Anomaly Detection in Adversarial Environments0
ADASYN-Random Forest Based Intrusion Detection Model0
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means0
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT0
Robustness of ML-Enhanced IDS to Stealthy Adversaries0
Adversarial Training for Deep Learning-based Intrusion Detection Systems0
Benchmarking the Benchmark -- Analysis of Synthetic NIDS Datasets0
Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning0
Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection0
A multiagent based framework secured with layered SVM-based IDS for remote healthcare systems0
Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review0
Performance Evaluation of Machine Learning Techniques for DoS Detection in Wireless Sensor Network0
Exploring Edge TPU for Network Intrusion Detection in IoT0
Evaluating Document Coherence Modelling0
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss0
Efficient Intrusion Detection Using Evidence Theory0
Image Classifiers for Network Intrusions0
Show:102550
← PrevPage 11 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified