SOTAVerified

Network Intrusion Detection

Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.

Papers

Showing 201250 of 261 papers

TitleStatusHype
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion DetectionCode0
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection0
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection SystemsCode1
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection0
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion DetectionCode0
Efficient Deep CNN-BiLSTM Model for Network Intrusion DetectionCode1
Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion DetectorsCode1
Adversarial Machine Learning in Network Intrusion Detection Systems0
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm0
LogicNets: Co-Designed Neural Networks and Circuits for Extreme-Throughput ApplicationsCode1
Hybrid Model For Intrusion Detection Systems0
1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data0
AnomalyDAE: Dual autoencoder for anomaly detection on attributed networksCode1
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Synthesis of a Machine Learning Model for Detecting Computer Attacks Based on the CICIDS2017 DatasetCode0
A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms0
Network Intrusion Detection based on LSTM and Feature Embedding0
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response0
Deep Anomaly Detection with Deviation NetworksCode0
Intrusion Detection using Sequential Hybrid Model0
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors0
WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
A Transfer Learning Approach for Network Intrusion Detection0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Sparse Bayesian approach for metric learning in latent spaceCode0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
Mimic Learning to Generate a Shareable Network Intrusion Detection Model0
Active Learning for Network Intrusion Detection0
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier0
Rallying Adversarial Techniques against Deep Learning for Network Security0
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework0
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks0
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternativesCode0
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber SecurityCode0
Anomaly Detection via Minimum Likelihood Generative Adversarial Networks0
Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier DetectionCode0
V-CNN: When Convolutional Neural Network encounters Data Visualization0
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection SystemsCode0
Onion-Peeling Outlier Detection in 2-D data Sets0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly DetectionCode0
A Deep Belief Network Based Machine Learning System for Risky Host Detection0
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection0
Security Evaluation of Pattern Classifiers under Attack0
Energy-based Models for Video Anomaly Detection0
Model Selection for Anomaly Detection0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
Show:102550
← PrevPage 5 of 6Next →

No leaderboard results yet.