SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 701750 of 800 papers

TitleStatusHype
RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System0
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data0
SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection0
Sdn Intrusion Detection Using Machine Learning Method0
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification0
Secure Mobile Crowdsensing with Deep Learning0
Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning0
Securing from Unseen: Connected Pattern Kernels (CoPaK) for Zero-Day Intrusion Detection0
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system0
Security Evaluation of Pattern Classifiers under Attack0
Security Evaluation of Support Vector Machines in Adversarial Environments0
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots0
Segmented Federated Learning for Adaptive Intrusion Detection System0
Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs0
Sequential Binary Classification for Intrusion Detection0
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space0
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey0
Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms0
SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks0
Simultaneous Intrusion Detection and Localization Using ISAC Network0
Smart Water Security with AI and Blockchain-Enhanced Digital Twins0
SoK: Applying Machine Learning in Security - A Survey0
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs0
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection0
SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks0
Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security ResearchCode0
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternativesCode0
Sequence Covering for Efficient Host-Based Intrusion DetectionCode0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analyticsCode0
ResGCN: Attention-based Deep Residual Modeling for Anomaly Detection on Attributed NetworksCode0
A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networksCode0
A Novel Multi-Stage Approach for Hierarchical Intrusion DetectionCode0
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesCode0
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic ClassificationCode0
The Cross-evaluation of Machine Learning-based Network Intrusion Detection SystemsCode0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT SystemsCode0
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber SecurityCode0
Detecting message modification attacks on the CAN bus with Temporal Convolutional NetworksCode0
A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection SystemsCode0
Data Distribution ValuationCode0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Learning Neural Representations for Network Anomaly DetectionCode0
Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput ComputingCode0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
Behavioural Reports of Multi-Stage MalwareCode0
A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network SecurityCode0
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical SystemCode0
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion DetectionCode0
Show:102550
← PrevPage 15 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified