SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 51100 of 800 papers

TitleStatusHype
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems0
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs0
Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD0
Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection0
Intrusion Detection in IoT Networks Using Hyperdimensional Computing: A Case Study on the NSL-KDD Dataset0
CAGN-GAT Fusion: A Hybrid Contrastive Attentive Graph Neural Network for Network Intrusion DetectionCode1
CRUPL: A Semi-Supervised Cyber Attack Detection with Consistency Regularization and Uncertainty-aware Pseudo-Labeling in Smart Grid0
Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids0
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven AnalysisCode1
Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless NetworksCode1
Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models0
CND-IDS: Continual Novelty Detection for Intrusion Detection Systems0
Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset0
Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions0
Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection SystemsCode0
Mapping the Landscape of Generative AI in Network Monitoring and Management0
Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT0
SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection0
A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks0
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries0
Technical Report: Generating the WEB-IDS23 Dataset0
Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security ResearchCode0
Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing0
Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDSCode0
Analysis of Zero Day Attack Detection Using MLP and XAI0
Investigating Application of Deep Neural Networks in Intrusion Detection System Design0
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data0
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning0
Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models0
A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network SecurityCode0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks0
Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures0
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction0
LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity0
Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection0
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks0
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network0
PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation0
A Temporal Convolutional Network-based Approach for Network Intrusion Detection0
Continual Learning with Strategic Selection and Forgetting for Network Intrusion DetectionCode1
Flow Exporter Impact on Intelligent Intrusion Detection Systems0
Enhancing Internet of Things Security throughSelf-Supervised Graph Neural Networks0
Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies0
PyOD 2: A Python Library for Outlier Detection with LLM-powered Model SelectionCode0
Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid0
Show:102550
← PrevPage 2 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified