SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 601650 of 800 papers

TitleStatusHype
The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling0
The Efficacy of Transformer-based Adversarial Attacks in Security Domains0
The importance of the clustering model to detect new types of intrusion in data traffic0
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey0
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System0
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection0
Time-Based CAN Intrusion Detection Benchmark0
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data0
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks0
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification0
Towards a graph-based foundation model for network traffic analysis0
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks0
Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services0
Towards Explainable Network Intrusion Detection using Large Language Models0
Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems0
Towards Network Traffic Monitoring Using Deep Transfer Learning0
Toward Supervised Anomaly Detection0
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection0
Training a quantum annealing based restricted Boltzmann machine on cybersecurity data0
Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations0
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence0
Trustworthy Anomaly Detection: A Survey0
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space0
Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System0
Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks0
Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids0
Unsupervised anomalies detection in IIoT edge devices networks using federated learning0
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape0
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort0
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars0
usfAD Based Effective Unknown Attack Detection Focused IDS Framework0
Using EBGAN for Anomaly Intrusion Detection0
Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model0
Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks0
Using Temporal and Topological Features for Intrusion Detection in Operational Networks0
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)0
V-CNN: When Convolutional Neural Network encounters Data Visualization0
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT0
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection0
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems0
WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning0
Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization0
Zero-day DDoS Attack Detection0
Zero-shot learning approach to adaptive Cybersecurity using Explainable AI0
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV0
Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset0
Show:102550
← PrevPage 13 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified