SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 451475 of 800 papers

TitleStatusHype
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification0
Towards a graph-based foundation model for network traffic analysis0
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks0
Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services0
Towards Explainable Network Intrusion Detection using Large Language Models0
Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems0
Towards Network Traffic Monitoring Using Deep Transfer Learning0
Toward Supervised Anomaly Detection0
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection0
Training a quantum annealing based restricted Boltzmann machine on cybersecurity data0
Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations0
Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence0
Trustworthy Anomaly Detection: A Survey0
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space0
Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System0
Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks0
Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids0
Unsupervised anomalies detection in IIoT edge devices networks using federated learning0
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape0
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort0
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars0
Show:102550
← PrevPage 19 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified