SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 651675 of 800 papers

TitleStatusHype
ZYELL-NCTU NetTraffic-1.0: A Large-Scale Dataset for Real-World Network Anomaly Detection0
Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things0
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs0
CRUPL: A Semi-Supervised Cyber Attack Detection with Consistency Regularization and Uncertainty-aware Pseudo-Labeling in Smart Grid0
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation0
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer0
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries0
A cognitive based Intrusion detection system0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks0
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection0
A comparative evaluation of novelty detection algorithms for discrete sequences0
A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures0
A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis0
A Compendium on Network and Host based Intrusion Detection Systems0
A concise method for feature selection via normalized frequencies0
A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks0
A Content-Based Deep Intrusion Detection System0
A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection0
Active Learning for Network Intrusion Detection0
Active Learning for Wireless IoT Intrusion Detection0
A Cutting-Edge Deep Learning Method For Enhancing IoT Security0
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection0
Show:102550
← PrevPage 27 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified