SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 501525 of 800 papers

TitleStatusHype
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
Past, Present, Future: A Comprehensive Exploration of AI Use Cases in the UMBRELLA IoT Testbed0
Payload-Aware Intrusion Detection with CMAE and Large Language Models0
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Performance Analysis of a Foreground Segmentation Neural Network Model0
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection0
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System0
Performance Evaluation of Machine Learning Techniques for DoS Detection in Wireless Sensor Network0
PIDNet: An Efficient Network for Dynamic Pedestrian Intrusion Detection0
Planning Landmark Based Goal Recognition Revisited: Does Using Initial State Landmarks Make Sense?0
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation0
PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security0
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System (ICS) Environment0
Predicting Network Attacks Using Ontology-Driven Inference0
Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets0
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection0
Privacy-Preserving Intrusion Detection using Convolutional Neural Networks0
Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification0
Protection of an information system by artificial intelligence: a three-phase approach based on behaviour analysis to detect a hostile scenario0
Show:102550
← PrevPage 21 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified