SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 426450 of 800 papers

TitleStatusHype
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach0
Machine Learning Applications in Misuse and Anomaly Detection0
Machine Learning Approach for Detection of nonTor Traffic0
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security0
Machine Learning-based Android Intrusion Detection System0
Machine Learning based Anomaly Detection for 5G Networks0
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction0
Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions0
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction0
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things0
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats0
Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments0
Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations0
Machine Learning Techniques for Intrusion Detection0
Manifold regularization based on Nyström type subsampling0
Man-in-the-Middle Intrusion Detection Based on CNN-LSTM Model0
Many Field Packet Classification with Decomposition and Reinforcement Learning0
Mapping the Landscape of Generative AI in Network Monitoring and Management0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network0
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs0
Model Selection for Anomaly Detection0
Modern Cybersecurity Solution using Supervised Machine Learning0
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection0
More Efficient Topic Modelling Through a Noun Only Approach0
Show:102550
← PrevPage 18 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified