SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 351400 of 800 papers

TitleStatusHype
A cognitive based Intrusion detection system0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks0
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection0
A comparative evaluation of novelty detection algorithms for discrete sequences0
A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures0
A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis0
A Compendium on Network and Host based Intrusion Detection Systems0
A concise method for feature selection via normalized frequencies0
A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks0
A Content-Based Deep Intrusion Detection System0
A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection0
Active Learning for Network Intrusion Detection0
Active Learning for Wireless IoT Intrusion Detection0
A Cutting-Edge Deep Learning Method For Enhancing IoT Security0
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection0
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection0
Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection0
Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models0
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning0
ADASYN-Random Forest Based Intrusion Detection Model0
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents0
A Deep Belief Network Based Machine Learning System for Risky Host Detection0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection0
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats0
Integrating Graph Neural Networks with Scattering Transform for Anomaly Detection0
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems0
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems0
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning0
Adversarial Examples in Constrained Domains0
Adversarial Machine Learning in Network Intrusion Detection Systems0
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review0
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems0
Adversarial Training for Deep Learning-based Intrusion Detection Systems0
A Dynamic Watermarking Algorithm for Finite Markov Decision Problems0
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection0
A Heterogeneous Graph Learning Model for Cyber-Attack Detection0
A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System0
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection0
A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System0
AI-based Two-Stage Intrusion Detection for Software Defined IoT Networks0
AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks0
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent0
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)0
A Life-long Learning Intrusion Detection System for 6G-Enabled IoV0
A Lightweight FPGA-based IDS-ECU Architecture for Automotive CAN0
A Lightweight IDS for Early APT Detection Using a Novel Feature Selection Method0
A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs0
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks0
Show:102550
← PrevPage 8 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified