SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 351375 of 800 papers

TitleStatusHype
Explaining Tree Model Decisions in Natural Language for Network Intrusion Detection0
Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces0
Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning0
Exploring Edge TPU for Network Intrusion Detection in IoT0
Exploring Global and Local Information for Anomaly Detection with Normal Samples0
Exploring Highly Quantised Neural Networks for Intrusion Detection in Automotive CAN0
Exploring Information Centrality for Intrusion Detection in Large Networks0
Are Trees Really Green? A Detection Approach of IoT Malware Attacks0
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection0
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means0
Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning0
Extreme bandits0
Fair Anomaly Detection For Imbalanced Groups0
Fast Feature Reduction in intrusion detection datasets0
FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS0
Feasibility of Non-Line-of-Sight Integrated Sensing and Communication at mmWave0
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems0
Feature Distribution Shift Mitigation with Contrastive Pretraining for Intrusion Detection0
Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks0
Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems0
Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification0
Feature selection for intrusion detection systems0
Feature Selection for Network Intrusion Detection0
Feature Selection using the concept of Peafowl Mating in IDS0
A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method0
Show:102550
← PrevPage 15 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified