SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 401450 of 800 papers

TitleStatusHype
Jasmine: A New Active Learning Approach to Combat Cybercrime0
Joint Semantic Transfer Network for IoT Intrusion Detection0
Kernel density estimation based sampling for imbalanced class distribution0
Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays0
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation0
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data0
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs0
Large Language Models for Cyber Security: A Systematic Literature Review0
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection0
Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection0
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT0
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks0
Learning automata based SVM for intrusion detection0
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters0
Learning detectors of malicious web requests for intrusion detection in network traffic0
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks0
Learning Privately from Multiparty Data0
Learning to Detect: A Data-driven Approach for Network Intrusion Detection0
Learning With Differential Privacy0
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems0
LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity0
Leveraging Planning Landmarks for Hybrid Online Goal Recognition0
Leveraging Siamese Networks for One-Shot Intrusion Detection Model0
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach0
Machine Learning Applications in Misuse and Anomaly Detection0
Machine Learning Approach for Detection of nonTor Traffic0
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security0
Machine Learning-based Android Intrusion Detection System0
Machine Learning based Anomaly Detection for 5G Networks0
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction0
Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions0
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction0
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things0
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats0
Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments0
Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations0
Machine Learning Techniques for Intrusion Detection0
Manifold regularization based on Nyström type subsampling0
Man-in-the-Middle Intrusion Detection Based on CNN-LSTM Model0
Many Field Packet Classification with Decomposition and Reinforcement Learning0
Mapping the Landscape of Generative AI in Network Monitoring and Management0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network0
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs0
Model Selection for Anomaly Detection0
Modern Cybersecurity Solution using Supervised Machine Learning0
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection0
More Efficient Topic Modelling Through a Noun Only Approach0
Show:102550
← PrevPage 9 of 16Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified