SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 376400 of 800 papers

TitleStatusHype
Behavioural Reports of Multi-Stage MalwareCode0
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification0
Leveraging Planning Landmarks for Hybrid Online Goal Recognition0
Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach0
BayBFed: Bayesian Backdoor Defense for Federated Learning0
Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification0
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection0
Detection, Explanation and Filtering of Cyber Attacks Combining Symbolic and Sub-Symbolic Methods0
Ensemble learning techniques for intrusion detection system in the context of cybersecurity0
DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection0
Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial NetworksCode0
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs0
Separating Flows in Encrypted Tunnel TrafficCode0
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection0
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning0
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection0
Network Security Modelling with Distributional Data0
Intrusion Detection in Internet of Things using Convolutional Neural Networks0
A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
Joint Semantic Transfer Network for IoT Intrusion Detection0
GowFed -- A novel Federated Network Intrusion Detection System0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
DI-NIDS: Domain Invariant Network Intrusion Detection System0
Show:102550
← PrevPage 16 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified