SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 726750 of 800 papers

TitleStatusHype
Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security ResearchCode0
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternativesCode0
Sequence Covering for Efficient Host-Based Intrusion DetectionCode0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analyticsCode0
ResGCN: Attention-based Deep Residual Modeling for Anomaly Detection on Attributed NetworksCode0
A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networksCode0
A Novel Multi-Stage Approach for Hierarchical Intrusion DetectionCode0
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesCode0
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic ClassificationCode0
The Cross-evaluation of Machine Learning-based Network Intrusion Detection SystemsCode0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT SystemsCode0
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber SecurityCode0
Detecting message modification attacks on the CAN bus with Temporal Convolutional NetworksCode0
A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection SystemsCode0
Data Distribution ValuationCode0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Learning Neural Representations for Network Anomaly DetectionCode0
Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput ComputingCode0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
Behavioural Reports of Multi-Stage MalwareCode0
A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network SecurityCode0
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical SystemCode0
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion DetectionCode0
Show:102550
← PrevPage 30 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified