SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 201225 of 800 papers

TitleStatusHype
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model0
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks0
Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach0
Characterization of Neural Networks Automatically Mapped on Automotive-grade Microcontrollers0
Clustering Algorithm to Detect Adversaries in Federated Learning0
CADeSH: Collaborative Anomaly Detection for Smart Homes0
CND-IDS: Continual Novelty Detection for Intrusion Detection Systems0
CoAP-DoS: An IoT Network Intrusion Dataset0
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection0
Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection0
A new semi-supervised inductive transfer learning framework: Co-Transfer0
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network0
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review0
Conformalized density- and distance-based anomaly detection in time-series data0
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework0
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems0
BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection0
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm0
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics0
Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation0
Adversarial Machine Learning in Network Intrusion Detection Systems0
A Content-Based Deep Intrusion Detection System0
A cognitive based Intrusion detection system0
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks0
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs0
Show:102550
← PrevPage 9 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified