SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 451475 of 800 papers

TitleStatusHype
Moving Object Classification with a Sub-6 GHz Massive MIMO Array using Real Data0
Multi-agent Reinforcement Learning-based Network Intrusion Detection System0
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications0
Multibit Tries Packet Classification with Deep Reinforcement Learning0
Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection0
Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol0
Multidomain transformer-based deep learning for early detection of network intrusion0
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems0
Multi-Source Data Fusion for Cyberattack Detection in Power Systems0
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study0
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks0
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needle0
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques0
NERD: Neural Network for Edict of Risky Data Streams0
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks0
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm0
Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD0
Network Intrusion Detection based on LSTM and Feature Embedding0
Network Intrusion Detection System in a Light Bulb0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Network Security Modelling with Distributional Data0
Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions0
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning0
Show:102550
← PrevPage 19 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified