SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 326350 of 800 papers

TitleStatusHype
Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata0
Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification0
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection0
Ensemble learning techniques for intrusion detection system in the context of cybersecurity0
EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector0
A review of Federated Learning in Intrusion Detection Systems for IoT0
Are Trees Really Green? A Detection Approach of IoT Malware Attacks0
Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges0
Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking0
A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data0
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network0
A Transformer-Based Framework for Payload Malware Detection and Classification0
Evaluating the Robustness of Time Series Anomaly and Intrusion Detection Methods against Adversarial Attacks0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
Evaluation of Machine Learning Algorithms for Intrusion Detection System0
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice0
Experimental Review of Neural-based approaches for Network Intrusion Management0
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems0
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions0
Automating Privilege Escalation with Deep Reinforcement Learning0
Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes0
Explainable Intrusion Detection Systems Using Competitive Learning Techniques0
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities0
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems0
A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method0
Show:102550
← PrevPage 14 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified