Simultaneous Intrusion Detection and Localization Using ISAC Network May 12, 2025 Intrusion Detection ISAC
— Unverified 0Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection Systems May 12, 2025 Anomaly Detection Contrastive Learning
Code Code Available 0Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced Datasets May 7, 2025 Anomaly Detection Binary Classification
Code Code Available 0Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems May 6, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability May 2, 2025 Adversarial Attack Intrusion Detection
— Unverified 0Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking Apr 29, 2025 Benchmarking Intrusion Detection
— Unverified 0A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems Apr 28, 2025 Decision Making Intrusion Detection
— Unverified 0Smart Water Security with AI and Blockchain-Enhanced Digital Twins Apr 28, 2025 Intrusion Detection
— Unverified 0Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization Apr 26, 2025 Autonomous Driving Autonomous Vehicles
— Unverified 0Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics Apr 24, 2025 Intrusion Detection
— Unverified 0Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security Apr 22, 2025 Anomaly Detection CPU
— Unverified 0FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection Apr 21, 2025 Feature Engineering Intrusion Detection
— Unverified 0Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs Apr 20, 2025 Intrusion Detection Scheduling
— Unverified 0Deep Learning-based Intrusion Detection Systems: A Survey Apr 10, 2025 Deep Learning Intrusion Detection
— Unverified 0Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security Apr 10, 2025 Intrusion Detection
— Unverified 0Hybrid Temporal Differential Consistency Autoencoder for Efficient and Sustainable Anomaly Detection in Cyber-Physical Systems Apr 8, 2025 Anomaly Detection Computational Efficiency
— Unverified 0WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems Apr 6, 2025 Federated Learning Intrusion Detection
— Unverified 0Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries Apr 2, 2025 Benchmarking Computational Efficiency
— Unverified 0CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat Detection Apr 2, 2025 Federated Learning Intrusion Detection
Code Code Available 0Integrated LLM-Based Intrusion Detection with Secure Slicing xApp for Securing O-RAN-Enabled Wireless Network Deployments Apr 1, 2025 Intrusion Detection
— Unverified 0Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems Mar 26, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture Mar 25, 2025 Intrusion Detection
— Unverified 0Payload-Aware Intrusion Detection with CMAE and Large Language Models Mar 23, 2025 Intrusion Detection Language Modeling
— Unverified 0Robust Intrusion Detection System with Explainable Artificial Intelligence Mar 7, 2025 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems Mar 6, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning Mar 5, 2025 Anomaly Detection Classification
— Unverified 0SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Mar 5, 2025 All Intrusion Detection
— Unverified 0Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection Mar 4, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD Mar 4, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Intrusion Detection in IoT Networks Using Hyperdimensional Computing: A Case Study on the NSL-KDD Dataset Mar 4, 2025 Intrusion Detection
— Unverified 0CRUPL: A Semi-Supervised Cyber Attack Detection with Consistency Regularization and Uncertainty-aware Pseudo-Labeling in Smart Grid Mar 1, 2025 Cyber Attack Detection Intrusion Detection
— Unverified 0Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids Feb 28, 2025 Intrusion Detection
— Unverified 0Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata Feb 23, 2025 Intrusion Detection
— Unverified 0A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems Feb 21, 2025 Ensemble Learning Feature Engineering
— Unverified 0Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models Feb 20, 2025 Intrusion Detection Multi-class Classification
— Unverified 0CND-IDS: Continual Novelty Detection for Intrusion Detection Systems Feb 19, 2025 Continual Learning Intrusion Detection
— Unverified 0Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset Feb 17, 2025 Hybrid Machine Learning Intrusion Detection
— Unverified 0Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems Feb 16, 2025 Intrusion Detection Network Intrusion Detection
Code Code Available 0Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions Feb 16, 2025 Decision Making Intrusion Detection
— Unverified 0Mapping the Landscape of Generative AI in Network Monitoring and Management Feb 12, 2025 Intrusion Detection Management
— Unverified 0SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection Feb 10, 2025 Anomaly Detection Intrusion Detection
— Unverified 0Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT Feb 10, 2025 Autonomous Vehicles Federated Learning
— Unverified 0A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks Feb 9, 2025 Generative Adversarial Network Intrusion Detection
— Unverified 0Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries Feb 7, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Technical Report: Generating the WEB-IDS23 Dataset Feb 6, 2025 Intrusion Detection Network Intrusion Detection
— Unverified 0Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research Feb 5, 2025 Intrusion Detection
Code Code Available 0Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing Feb 5, 2025 Intrusion Detection Quantum Machine Learning
— Unverified 0Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS Jan 31, 2025 Intrusion Detection
Code Code Available 0Analysis of Zero Day Attack Detection Using MLP and XAI Jan 28, 2025 Feature Importance Intrusion Detection
— Unverified 0Investigating Application of Deep Neural Networks in Intrusion Detection System Design Jan 27, 2025 feature selection Intrusion Detection
— Unverified 0