PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning Mar 5, 2025 Anomaly Detection Classification
— Unverified 0Past, Present, Future: A Comprehensive Exploration of AI Use Cases in the UMBRELLA IoT Testbed Jan 24, 2024 Federated Learning Intrusion Detection
— Unverified 0Payload-Aware Intrusion Detection with CMAE and Large Language Models Mar 23, 2025 Intrusion Detection Language Modeling
— Unverified 0PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments Jan 26, 2025 backdoor defense Deep Learning
— Unverified 0Pelican: A Deep Residual Network for Network Intrusion Detection Jan 19, 2020 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Performance Analysis of a Foreground Segmentation Neural Network Model May 26, 2021 Anomaly Detection Decoder
— Unverified 0Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection Aug 22, 2023 Anomaly Detection Intrusion Detection
— Unverified 0Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Oct 13, 2017 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Performance Evaluation of Machine Learning Techniques for DoS Detection in Wireless Sensor Network Apr 5, 2021 BIG-bench Machine Learning Intrusion Detection
— Unverified 0PIDNet: An Efficient Network for Dynamic Pedestrian Intrusion Detection Sep 1, 2020 Feature Compression Intrusion Detection
— Unverified 0Planning Landmark Based Goal Recognition Revisited: Does Using Initial State Landmarks Make Sense? Jun 27, 2023 Intrusion Detection
— Unverified 0POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour Apr 29, 2023 Anomaly Detection Intrusion Detection
— Unverified 0PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning Jan 14, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis Jun 25, 2025 Adversarial Attack Intrusion Detection
— Unverified 0PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation Dec 24, 2024 Intrusion Detection
— Unverified 0PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security Jun 19, 2024 Graph Neural Network Intrusion Detection
— Unverified 0Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Sep 20, 2017 Anomaly Detection BIG-bench Machine Learning
— Unverified 0Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS May 20, 2024 Intrusion Detection Network Intrusion Detection
— Unverified 0Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment Jul 1, 2021 feature selection Intrusion Detection
— Unverified 0Predicting Network Attacks Using Ontology-Driven Inference Apr 3, 2013 Intrusion Detection Management
— Unverified 0Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets Jul 24, 2024 Deep Learning Intrusion Detection
— Unverified 0Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection Feb 28, 2022 Benchmarking Intrusion Detection
— Unverified 0Privacy-Preserving Intrusion Detection using Convolutional Neural Networks Apr 15, 2024 Intrusion Detection Privacy Preserving
— Unverified 0Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification Mar 5, 2019 Decoder Fraud Detection
— Unverified 0Protection of an information system by artificial intelligence: a three-phase approach based on behaviour analysis to detect a hostile scenario Dec 3, 2018 Intrusion Detection Management
— Unverified 0PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks Oct 6, 2021 Generative Adversarial Network Intrusion Detection
— Unverified 0PyOD 2: A Python Library for Outlier Detection with LLM-powered Model Selection Dec 11, 2024 Anomaly Detection Fraud Detection
— Unverified 0Quantised Neural Network Accelerators for Low-Power IDS in Automotive Networks Jan 19, 2024 Intrusion Detection
— Unverified 0Rallying Adversarial Techniques against Deep Learning for Network Security Mar 27, 2019 BIG-bench Machine Learning Deep Learning
— Unverified 0RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks Jan 6, 2021 graph construction graph partitioning
— Unverified 0Real-time Network Intrusion Detection via Decision Transformers Dec 12, 2023 Decision Making Intrusion Detection
— Unverified 0Real-time Regular Expression Matching Aug 20, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Real-Time Zero-Day Intrusion Detection System for Automotive Controller Area Network on FPGAs Jan 19, 2024 Intrusion Detection Zero-day intrusion detection
— Unverified 0Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach Apr 13, 2024 Intrusion Detection
— Unverified 0Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection Mar 13, 2018 Anomaly Detection Deep Learning
— Unverified 0REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response May 23, 2023 Intrusion Detection
— Unverified 0Reinforcement Learning for Feedback-Enabled Cyber Resilience Jul 2, 2021 Intrusion Detection reinforcement-learning
— Unverified 0Relevant Feature Selection Model Using Data Mining for Intrusion Detection System Mar 30, 2014 feature selection Intrusion Detection
— Unverified 0RePAD: Real-time Proactive Anomaly Detection for Time Series Jan 24, 2020 Anomaly Detection Fraud Detection
— Unverified 0ReRe: A Lightweight Real-time Ready-to-Go Anomaly Detection Approach for Time Series Apr 5, 2020 Anomaly Detection Intrusion Detection
— Unverified 0Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems Dec 4, 2020 Deep Learning Intrusion Detection
— Unverified 0Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems Mar 13, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture Nov 27, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning Dec 21, 2020 Deep Learning Intrusion Detection
— Unverified 0Road Context-aware Intrusion Detection System for Autonomous Cars Aug 2, 2019 Intrusion Detection
— Unverified 0A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset Dec 29, 2020 Anomaly Detection Benchmarking
— Unverified 0Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Jun 23, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Robust Attack Detection Approach for IIoT Using Ensemble Classifier Jan 30, 2021 Anomaly Detection Intrusion Detection
— Unverified 0Robust Intrusion Detection System with Explainable Artificial Intelligence Mar 7, 2025 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Robustness of ML-Enhanced IDS to Stealthy Adversaries Apr 21, 2021 Anomaly Detection Intrusion Detection
— Unverified 0