Explaining Network Intrusion Detection System Using Explainable AI Framework Mar 12, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Mar 10, 2021 Intrusion Detection Network Intrusion Detection
— Unverified 0ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network Anomaly Detection Mar 8, 2021 Anomaly Detection Intrusion Detection
— Unverified 0Characterization of Neural Networks Automatically Mapped on Automotive-grade Microcontrollers Feb 27, 2021 Capacity Estimation Intrusion Detection
— Unverified 0Clustering Algorithm to Detect Adversaries in Federated Learning Feb 22, 2021 Clustering Federated Learning
— Unverified 0How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection? Feb 12, 2021 Anomaly Detection Fraud Detection
— Unverified 0TINKER: A framework for Open source Cyberthreat Intelligence Feb 10, 2021 Information Retrieval Intrusion Detection
— Unverified 0Moving Object Classification with a Sub-6 GHz Massive MIMO Array using Real Data Feb 9, 2021 Classification General Classification
— Unverified 0Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks Feb 6, 2021 Autonomous Vehicles Intrusion Detection
Code Code Available 0DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware Feb 1, 2021 Deep Reinforcement Learning Intrusion Detection
— Unverified 0Robust Attack Detection Approach for IIoT Using Ensemble Classifier Jan 30, 2021 Anomaly Detection Intrusion Detection
— Unverified 0Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy Jan 25, 2021 Continual Learning Intrusion Detection
— Unverified 0Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset Jan 21, 2021 Intrusion Detection Multi-class Classification
— Unverified 0Multi-Source Data Fusion for Cyberattack Detection in Power Systems Jan 18, 2021 Imputation Intrusion Detection
— Unverified 0Time-Based CAN Intrusion Detection Benchmark Jan 14, 2021 Intrusion Detection
— Unverified 0An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks Jan 10, 2021 BIG-bench Machine Learning Binary Classification
— Unverified 0RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks Jan 6, 2021 graph construction graph partitioning
— Unverified 0Towards Network Traffic Monitoring Using Deep Transfer Learning Jan 4, 2021 Classification General Classification
— Unverified 0A Novel Resampling Technique for Imbalanced Dataset Optimization Dec 30, 2020 Intrusion Detection Malware Detection
— Unverified 0A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset Dec 29, 2020 Anomaly Detection Benchmarking
— Unverified 0Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder Dec 27, 2020 Anomaly Detection Intrusion Detection
Code Code Available 0Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS Dec 26, 2020 Intrusion Detection Language Modeling
— Unverified 0Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File Fragments Dec 23, 2020 Classification Computer Security
Code Code Available 0RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning Dec 21, 2020 Deep Learning Intrusion Detection
— Unverified 0Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape Dec 21, 2020 Anomaly Detection Binary Classification
— Unverified 0Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach Dec 16, 2020 Bayesian Optimization BIG-bench Machine Learning
— Unverified 0Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches Dec 15, 2020 Intrusion Detection
— Unverified 0An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies Dec 9, 2020 Intrusion Detection Outlier Detection
— Unverified 0Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems Dec 4, 2020 Deep Learning Intrusion Detection
— Unverified 0Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning Dec 2, 2020 Edge-computing Intrusion Detection
— Unverified 0Training a quantum annealing based restricted Boltzmann machine on cybersecurity data Nov 24, 2020 Intrusion Detection
— Unverified 0Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack Nov 23, 2020 BIG-bench Machine Learning Ensemble Learning
— Unverified 0Enhanced Few-shot Learning for Intrusion Detection in Railway Video Surveillance Nov 9, 2020 Few-Shot Learning Intrusion Detection
— Unverified 0Adversarial Examples in Constrained Domains Nov 2, 2020 Intrusion Detection Network Intrusion Detection
— Unverified 0Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort Nov 1, 2020 Intrusion Detection
— Unverified 0DualNet: Locate Then Detect Effective Payload with Deep Attention Network Oct 23, 2020 Deep Attention Intrusion Detection
— Unverified 0On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series Oct 16, 2020 Anomaly Detection Intrusion Detection
— Unverified 0DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture Oct 16, 2020 Deep Learning Intrusion Detection
— Unverified 0Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection Oct 15, 2020 Intrusion Detection Network Intrusion Detection
— Unverified 0Interpretable Sequence Classification via Discrete Optimization Oct 6, 2020 Classification counterfactual
Code Code Available 0The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling Oct 6, 2020 Intrusion Detection Multi-Task Learning
— Unverified 0ResGCN: Attention-based Deep Residual Modeling for Anomaly Detection on Attributed Networks Sep 30, 2020 Anomaly Detection Intrusion Detection
Code Code Available 0Graph-Based Intrusion Detection System for Controller Area Networks Sep 24, 2020 Intrusion Detection
— Unverified 0Experimental Review of Neural-based approaches for Network Intrusion Management Sep 18, 2020 Intrusion Detection Management
— Unverified 0Machine Learning Applications in Misuse and Anomaly Detection Sep 10, 2020 Anomaly Detection BIG-bench Machine Learning
— Unverified 0PIDNet: An Efficient Network for Dynamic Pedestrian Intrusion Detection Sep 1, 2020 Feature Compression Intrusion Detection
— Unverified 0Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection Aug 28, 2020 Intrusion Detection Network Intrusion Detection
Code Code Available 0Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Aug 11, 2020 feature selection Intrusion Detection
— Unverified 0Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection Aug 9, 2020 BIG-bench Machine Learning feature selection
— Unverified 0Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection Aug 5, 2020 Anomaly Detection Bayesian Optimization
— Unverified 0