SOTAVerified

Network Intrusion Detection

Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.

Papers

Showing 151200 of 261 papers

TitleStatusHype
Toward Supervised Anomaly Detection0
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs0
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection0
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection0
Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection0
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT0
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks0
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks0
Learning Privately from Multiparty Data0
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI0
Learning to Detect: A Data-driven Approach for Network Intrusion Detection0
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review0
Adversarial Machine Learning in Network Intrusion Detection Systems0
Machine Learning Applications in Misuse and Anomaly Detection0
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction0
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction0
Mapping the Landscape of Generative AI in Network Monitoring and Management0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
Model Selection for Anomaly Detection0
Multi-agent Reinforcement Learning-based Network Intrusion Detection System0
Multidomain transformer-based deep learning for early detection of network intrusion0
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
Adversarial Examples in Constrained Domains0
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks0
Network Intrusion Detection based on LSTM and Feature Embedding0
Network Intrusion Detection System in a Light Bulb0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning0
One-Shot Learning on Attributed Sequences0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Onion-Peeling Outlier Detection in 2-D data Sets0
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems0
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection0
On the (Statistical) Detection of Adversarial Examples0
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection0
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour0
Integrating Graph Neural Networks with Scattering Transform for Anomaly Detection0
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection0
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection0
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems0
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks0
Show:102550
← PrevPage 4 of 6Next →

No leaderboard results yet.