SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 151175 of 800 papers

TitleStatusHype
A Novel Federated Learning-Based IDS for Enhancing UAVs Privacy and Security0
AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks0
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks0
A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach0
AI-based Two-Stage Intrusion Detection for Software Defined IoT Networks0
Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection0
A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System0
Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis0
An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks0
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection0
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection0
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks0
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection0
Anomaly Detection via Minimum Likelihood Generative Adversarial Networks0
A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System0
Anomaly Detection via Federated Learning0
Anomaly detection optimization using big data and deep learning to reduce false-positive0
A Heterogeneous Graph Learning Model for Cyber-Attack Detection0
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection0
Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms0
Anomaly Detection in Intra-Vehicle Networks0
Cybersecurity Anomaly Detection in Adversarial Environments0
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection0
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection0
A Cutting-Edge Deep Learning Method For Enhancing IoT Security0
Show:102550
← PrevPage 7 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified