SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 676700 of 800 papers

TitleStatusHype
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks0
PyOD 2: A Python Library for Outlier Detection with LLM-powered Model Selection0
Quantised Neural Network Accelerators for Low-Power IDS in Automotive Networks0
Rallying Adversarial Techniques against Deep Learning for Network Security0
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks0
Real-time Network Intrusion Detection via Decision Transformers0
Real-time Regular Expression Matching0
Real-Time Zero-Day Intrusion Detection System for Automotive Controller Area Network on FPGAs0
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach0
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection0
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response0
Reinforcement Learning for Feedback-Enabled Cyber Resilience0
Relevant Feature Selection Model Using Data Mining for Intrusion Detection System0
RePAD: Real-time Proactive Anomaly Detection for Time Series0
ReRe: A Lightweight Real-time Ready-to-Go Anomaly Detection Approach for Time Series0
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems0
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems0
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture0
RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning0
Road Context-aware Intrusion Detection System for Autonomous Cars0
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset0
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS20170
Robust Attack Detection Approach for IIoT Using Ensemble Classifier0
Robust Intrusion Detection System with Explainable Artificial Intelligence0
Robustness of ML-Enhanced IDS to Stealthy Adversaries0
Show:102550
← PrevPage 28 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified