SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 626650 of 800 papers

TitleStatusHype
Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System0
Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks0
Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids0
Unsupervised anomalies detection in IIoT edge devices networks using federated learning0
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape0
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort0
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars0
usfAD Based Effective Unknown Attack Detection Focused IDS Framework0
Using EBGAN for Anomaly Intrusion Detection0
Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model0
Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks0
Using Temporal and Topological Features for Intrusion Detection in Operational Networks0
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)0
V-CNN: When Convolutional Neural Network encounters Data Visualization0
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT0
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection0
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems0
WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning0
Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization0
Zero-day DDoS Attack Detection0
Zero-shot learning approach to adaptive Cybersecurity using Explainable AI0
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV0
Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset0
Show:102550
← PrevPage 26 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified