SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 151200 of 800 papers

TitleStatusHype
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent0
Real-time Event Recognition of Long-distance Distributed Vibration Sensing with Knowledge Distillation and Hardware AccelerationCode1
Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets0
A Life-long Learning Intrusion Detection System for 6G-Enabled IoV0
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions0
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach0
Integrating Artificial Intelligence into Operating Systems: A Comprehensive Survey on Techniques, Applications, and Future Directions0
Impacts of Data Preprocessing and Hyperparameter Optimization on the Performance of Machine Learning Models Applied to Intrusion Detection Systems0
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes0
Federated PCA on Grassmann Manifold for IoT Anomaly DetectionCode1
Multi-agent Reinforcement Learning-based Network Intrusion Detection System0
A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection0
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection in Vehicular Networks0
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV0
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks0
Diffusion-based Adversarial Purification for Intrusion DetectionCode0
PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security0
Benchmarking Unsupervised Online IDS for Masquerade Attacks in CANCode0
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor AttacksCode0
Feasibility of Non-Line-of-Sight Integrated Sensing and Communication at mmWave0
A Cutting-Edge Deep Learning Method For Enhancing IoT Security0
Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks0
Explainable AI for Comparative Analysis of Intrusion Detection ModelsCode0
Detection-Rate-Emphasized Multi-objective Evolutionary Feature Selection for Network Intrusion Detection0
Efficient Network Traffic Feature Sets for IoT Intrusion Detection0
CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks SimulationCode0
SSCL-IDS: Enhancing Generalization of Intrusion Detection with Self-Supervised Contrastive LearningCode0
Sequential Binary Classification for Intrusion Detection0
Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions0
Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion DetectionCode0
PolyLUT-Add: FPGA-based LUT Inference with Wide InputsCode1
Generative AI-in-the-loop: Integrating LLMs and GPTs into the Next Generation Networks0
Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning0
A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI0
Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu0
Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems0
Survey of Graph Neural Network for Internet of Things and NextG Networks0
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation0
Strategic Deployment of Honeypots in Blockchain-based IoT Systems0
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities0
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection0
Large Language Models for Cyber Security: A Systematic Literature ReviewCode0
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles0
Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence0
Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems0
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study0
Feature Distribution Shift Mitigation with Contrastive Pretraining for Intrusion Detection0
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems0
Show:102550
← PrevPage 4 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified