SOTAVerified

Network Intrusion Detection

Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.

Papers

Showing 201250 of 261 papers

TitleStatusHype
Adversarial Examples in Constrained Domains0
DualNet: Locate Then Detect Effective Payload with Deep Attention Network0
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection0
The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling0
Machine Learning Applications in Misuse and Anomaly Detection0
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion DetectionCode0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion DetectionCode0
Adversarial Machine Learning in Network Intrusion Detection Systems0
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm0
Hybrid Model For Intrusion Detection Systems0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Synthesis of a Machine Learning Model for Detecting Computer Attacks Based on the CICIDS2017 DatasetCode0
A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms0
Network Intrusion Detection based on LSTM and Feature Embedding0
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response0
Deep Anomaly Detection with Deviation NetworksCode0
Intrusion Detection using Sequential Hybrid Model0
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors0
WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
A Transfer Learning Approach for Network Intrusion Detection0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Sparse Bayesian approach for metric learning in latent spaceCode0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier0
Active Learning for Network Intrusion Detection0
Rallying Adversarial Techniques against Deep Learning for Network Security0
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternativesCode0
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber SecurityCode0
Anomaly Detection via Minimum Likelihood Generative Adversarial Networks0
Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier DetectionCode0
V-CNN: When Convolutional Neural Network encounters Data Visualization0
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection SystemsCode0
Onion-Peeling Outlier Detection in 2-D data Sets0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly DetectionCode0
A Deep Belief Network Based Machine Learning System for Risky Host Detection0
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection0
Security Evaluation of Pattern Classifiers under Attack0
Energy-based Models for Video Anomaly Detection0
Model Selection for Anomaly Detection0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
Show:102550
← PrevPage 5 of 6Next →

No leaderboard results yet.