SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 101150 of 800 papers

TitleStatusHype
Simultaneous Intrusion Detection and Localization Using ISAC Network0
Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection SystemsCode0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking0
A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems0
Smart Water Security with AI and Blockchain-Enhanced Digital Twins0
Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization0
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection0
Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs0
Deep Learning-based Intrusion Detection Systems: A Survey0
Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security0
Hybrid Temporal Differential Consistency Autoencoder for Efficient and Sustainable Anomaly Detection in Cyber-Physical Systems0
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems0
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries0
CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat DetectionCode0
Integrated LLM-Based Intrusion Detection with Secure Slicing xApp for Securing O-RAN-Enabled Wireless Network Deployments0
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems0
Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture0
Payload-Aware Intrusion Detection with CMAE and Large Language Models0
Robust Intrusion Detection System with Explainable Artificial Intelligence0
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems0
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs0
Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection0
Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD0
Intrusion Detection in IoT Networks Using Hyperdimensional Computing: A Case Study on the NSL-KDD Dataset0
CRUPL: A Semi-Supervised Cyber Attack Detection with Consistency Regularization and Uncertainty-aware Pseudo-Labeling in Smart Grid0
Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids0
Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models0
CND-IDS: Continual Novelty Detection for Intrusion Detection Systems0
Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset0
Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection SystemsCode0
Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions0
Mapping the Landscape of Generative AI in Network Monitoring and Management0
SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection0
Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT0
A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks0
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries0
Technical Report: Generating the WEB-IDS23 Dataset0
Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security ResearchCode0
Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing0
Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDSCode0
Analysis of Zero Day Attack Detection Using MLP and XAI0
Investigating Application of Deep Neural Networks in Intrusion Detection System Design0
Show:102550
← PrevPage 3 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified