SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 201250 of 800 papers

TitleStatusHype
Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection0
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems0
Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach0
Characterization of Neural Networks Automatically Mapped on Automotive-grade Microcontrollers0
Clustering Algorithm to Detect Adversaries in Federated Learning0
A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection0
CND-IDS: Continual Novelty Detection for Intrusion Detection Systems0
CoAP-DoS: An IoT Network Intrusion Dataset0
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection0
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks0
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network0
CADeSH: Collaborative Anomaly Detection for Smart Homes0
Conformalized density- and distance-based anomaly detection in time-series data0
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection0
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems0
A new semi-supervised inductive transfer learning framework: Co-Transfer0
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation0
BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection0
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm0
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics0
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks0
Creating an Explainable Intrusion Detection System Using Self Organizing Maps0
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data0
Adversarial Machine Learning in Network Intrusion Detection Systems0
A Content-Based Deep Intrusion Detection System0
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss0
CyberRAG: An agentic RAG cyber attack classification and reporting tool0
A cognitive based Intrusion detection system0
Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures0
Data Analysis of Wireless Networks Using Classification Techniques0
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs0
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?0
Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation0
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review0
Dealing with Imbalanced Classes in Bot-IoT Dataset0
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach0
Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection0
Decision-forest voting scheme for classification of rare classes in network intrusion detection0
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework0
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security0
DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture0
Blockchain Large Language Models0
A New Clustering Approach for Anomaly Intrusion Detection0
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure0
Deep Learning-based Intrusion Detection Systems: A Survey0
Deep Neural Networks based Meta-Learning for Network Intrusion Detection0
Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models0
Show:102550
← PrevPage 5 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified