SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 326350 of 800 papers

TitleStatusHype
Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata0
An Adversarial Approach for Explainable AI in Intrusion Detection Systems0
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection0
Ensemble learning techniques for intrusion detection system in the context of cybersecurity0
EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector0
End-To-End Anomaly Detection for Identifying Malicious Cyber Behavior through NLP-Based Log Embeddings0
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks0
Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges0
Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking0
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS0
EMO\&LY (EMOtion and AnomaLY) : A new corpus for anomaly detection in an audiovisual stream with emotional context.0
Assessing Cyclostationary Malware Detection via Feature Selection and Classification0
Evaluating the Robustness of Time Series Anomaly and Intrusion Detection Methods against Adversarial Attacks0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
Evaluation of Machine Learning Algorithms for Intrusion Detection System0
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice0
Experimental Review of Neural-based approaches for Network Intrusion Management0
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks0
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions0
EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning0
Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes0
Explainable Intrusion Detection Systems Using Competitive Learning Techniques0
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities0
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems0
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors0
Show:102550
← PrevPage 14 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified