SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 476500 of 800 papers

TitleStatusHype
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions0
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks0
Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification0
OCLEP+: One-class Anomaly and Intrusion Detection Using Minimal Length of Emerging Patterns0
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack0
Omni SCADA Intrusion Detection Using Deep Learning Algorithms0
One-Class Classification for Intrusion Detection on Vehicular Networks0
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks0
One-Shot Learning on Attributed Sequences0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Onion-Peeling Outlier Detection in 2-D data Sets0
Online Dictionary Learning Based Fault and Cyber Attack Detection for Power Systems0
Online Feature Ranking for Intrusion Detection Systems0
Online Self-Supervised Deep Learning for Intrusion Detection Systems0
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection0
On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.00
On the (Statistical) Detection of Adversarial Examples0
On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series0
Open Set Dandelion Network for IoT Intrusion Detection0
Integrating Artificial Intelligence into Operating Systems: A Comprehensive Survey on Techniques, Applications, and Future Directions0
Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks0
Optimized IoT Intrusion Detection using Machine Learning Technique0
Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu0
Orthogonal variance-based feature selection for intrusion detection systems0
Show:102550
← PrevPage 20 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified