SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 2650 of 800 papers

TitleStatusHype
Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection SystemsCode0
Simultaneous Intrusion Detection and Localization Using ISAC Network0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking0
Smart Water Security with AI and Blockchain-Enhanced Digital Twins0
A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems0
Simplified and Secure MCP Gateways for Enterprise AI IntegrationCode1
Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization0
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection0
Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs0
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security0
Deep Learning-based Intrusion Detection Systems: A Survey0
Hybrid Temporal Differential Consistency Autoencoder for Efficient and Sustainable Anomaly Detection in Cyber-Physical Systems0
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems0
CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat DetectionCode0
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries0
Integrated LLM-Based Intrusion Detection with Secure Slicing xApp for Securing O-RAN-Enabled Wireless Network Deployments0
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems0
Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture0
Payload-Aware Intrusion Detection with CMAE and Large Language Models0
Robust Intrusion Detection System with Explainable Artificial Intelligence0
Show:102550
← PrevPage 2 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified