SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 151175 of 800 papers

TitleStatusHype
A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data0
PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments0
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning0
Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network SecurityCode0
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks0
Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures0
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction0
LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity0
Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection0
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks0
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network0
PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation0
A Temporal Convolutional Network-based Approach for Network Intrusion Detection0
Flow Exporter Impact on Intelligent Intrusion Detection Systems0
Enhancing Internet of Things Security throughSelf-Supervised Graph Neural Networks0
Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies0
PyOD 2: A Python Library for Outlier Detection with LLM-powered Model SelectionCode0
Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid0
Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity0
Machine Learning-based Android Intrusion Detection System0
Convolutional Neural Networks and Mixture of Experts for Intrusion Detection in 5G Networks and beyond0
Optimized IoT Intrusion Detection using Machine Learning Technique0
Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles0
Show:102550
← PrevPage 7 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified