SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 601650 of 800 papers

TitleStatusHype
Moving Object Classification with a Sub-6 GHz Massive MIMO Array using Real Data0
Multi-agent Reinforcement Learning-based Network Intrusion Detection System0
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications0
Multibit Tries Packet Classification with Deep Reinforcement Learning0
Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection0
Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol0
Multidomain transformer-based deep learning for early detection of network intrusion0
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems0
Multi-Source Data Fusion for Cyberattack Detection in Power Systems0
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study0
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks0
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needle0
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques0
NERD: Neural Network for Edict of Risky Data Streams0
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks0
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm0
Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD0
Network Intrusion Detection based on LSTM and Feature Embedding0
Network Intrusion Detection System in a Light Bulb0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Network Security Modelling with Distributional Data0
Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions0
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning0
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions0
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks0
Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification0
OCLEP+: One-class Anomaly and Intrusion Detection Using Minimal Length of Emerging Patterns0
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack0
Omni SCADA Intrusion Detection Using Deep Learning Algorithms0
One-Class Classification for Intrusion Detection on Vehicular Networks0
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks0
One-Shot Learning on Attributed Sequences0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Onion-Peeling Outlier Detection in 2-D data Sets0
Online Dictionary Learning Based Fault and Cyber Attack Detection for Power Systems0
Online Feature Ranking for Intrusion Detection Systems0
Online Self-Supervised Deep Learning for Intrusion Detection Systems0
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection0
On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.00
On the (Statistical) Detection of Adversarial Examples0
On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series0
Open Set Dandelion Network for IoT Intrusion Detection0
Integrating Artificial Intelligence into Operating Systems: A Comprehensive Survey on Techniques, Applications, and Future Directions0
Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks0
Optimized IoT Intrusion Detection using Machine Learning Technique0
Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu0
Orthogonal variance-based feature selection for intrusion detection systems0
Show:102550
← PrevPage 13 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified