SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 101125 of 800 papers

TitleStatusHype
Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity0
Machine Learning-based Android Intrusion Detection System0
Convolutional Neural Networks and Mixture of Experts for Intrusion Detection in 5G Networks and beyond0
Optimized IoT Intrusion Detection using Machine Learning Technique0
Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles0
Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications0
Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks0
An AutoML-based approach for Network Intrusion Detection0
The importance of the clustering model to detect new types of intrusion in data traffic0
Feature Selection for Network Intrusion Detection0
Take Package as Language: Anomaly Detection Using TransformerCode0
Intelligent Green Efficiency for Intrusion Detection0
Sdn Intrusion Detection Using Machine Learning Method0
Securing from Unseen: Connected Pattern Kernels (CoPaK) for Zero-Day Intrusion Detection0
Enhanced Real-Time Threat Detection in 5G Networks: A Self-Attention RNN Autoencoder Approach for Spectral Intrusion Analysis0
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection0
SCGNet-Stacked Convolution with Gated Recurrent Unit Network for Cyber Network Intrusion Detection and Intrusion Type ClassificationCode0
Implementing Lightweight Intrusion Detection System on Resource Constrained DevicesCode0
A Generative Model Based Honeypot for Industrial OPC UA CommunicationCode0
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection SystemsCode0
FedMSE: Federated learning for IoT network intrusion detectionCode1
XAI-based Feature Selection for Improved Network Intrusion Detection SystemsCode0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data0
Show:102550
← PrevPage 5 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified