SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 301325 of 800 papers

TitleStatusHype
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes0
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
A Compendium on Network and Host based Intrusion Detection Systems0
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
A survey on deep packet inspection for intrusion detection systems0
A Survey of Learning-Based Intrusion Detection Systems for In-Vehicle Network0
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection0
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning0
Enhanced Few-shot Learning for Intrusion Detection in Railway Video Surveillance0
Energy-based Models for Video Anomaly Detection0
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection0
An Adversarial Approach for Explainable AI in Intrusion Detection Systems0
Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks0
Enhanced network anomaly detection based on deep neural networks0
Enhanced Real-Time Threat Detection in 5G Networks: A Self-Attention RNN Autoencoder Approach for Spectral Intrusion Analysis0
Enhancing Cohesion and Coherence of Fake Text to Improve Believability for Deceiving Cyber Attackers0
Utilizing Deep Learning for Enhancing Network Resilience in Finance0
Enhancing Internet of Things Security throughSelf-Supervised Graph Neural Networks0
Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning0
Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks0
Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems0
Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems0
End-To-End Anomaly Detection for Identifying Malicious Cyber Behavior through NLP-Based Log Embeddings0
Show:102550
← PrevPage 13 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified