SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 276300 of 800 papers

TitleStatusHype
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks0
End-To-End Anomaly Detection for Identifying Malicious Cyber Behavior through NLP-Based Log Embeddings0
Energy-based Models for Video Anomaly Detection0
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks0
DualNet: Locate Then Detect Effective Payload with Deep Attention Network0
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection0
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems0
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning0
DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware0
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response0
Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT0
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges0
Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems0
ECU Identification using Neural Network Classification and Hyperparameter Tuning0
DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection0
EdgeServe: A Streaming System for Decentralized Model Serving0
Effective Intrusion Detection for UAV Communications using Autoencoder-based Feature Extraction and Machine Learning Approach0
Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS0
Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid0
Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection0
Effective Multi-Stage Training Model For Edge Computing Devices In Intrusion Detection0
Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks0
Efficient classification using parallel and scalable compressed model and Its application on intrusion detection0
A Review of Machine Learning based Anomaly Detection Techniques0
A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs0
Show:102550
← PrevPage 12 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified