SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 576600 of 800 papers

TitleStatusHype
Sorting out typicality with the inverse moment matrix SOS polynomial0
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection0
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems0
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems0
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles0
Strategic Deployment of Honeypots in Blockchain-based IoT Systems0
Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning0
Towards Explainable Meta-Learning for DDoS Detection0
Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System0
Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review0
Survey of Graph Neural Network for Internet of Things and NextG Networks0
Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things0
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process0
Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks0
Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic0
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles0
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems0
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Technical Report: Generating the WEB-IDS23 Dataset0
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems0
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction0
The Dendritic Cell Algorithm for Intrusion Detection0
Show:102550
← PrevPage 24 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified