SOTAVerified

Network Intrusion Detection

Network intrusion detection is the task of monitoring network traffic to and from all devices on a network in order to detect computer attacks.

Papers

Showing 201250 of 261 papers

TitleStatusHype
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning0
NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability0
One-Shot Learning on Attributed Sequences0
On Generalisability of Machine Learning-based Network Intrusion Detection Systems0
Onion-Peeling Outlier Detection in 2-D data Sets0
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection0
On the (Statistical) Detection of Adversarial Examples0
PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning0
Pelican: A Deep Residual Network for Network Intrusion Detection0
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection0
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour0
PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning0
Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis0
PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security0
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS0
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection0
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks0
Rallying Adversarial Techniques against Deep Learning for Network Security0
Real-time Network Intrusion Detection via Decision Transformers0
Real-time Regular Expression Matching0
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems0
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems0
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture0
RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning0
A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset0
SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection0
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification0
Hybrid Isolation Forest - Application to Intrusion DetectionCode0
The Cross-evaluation of Machine Learning-based Network Intrusion Detection SystemsCode0
Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial NetworksCode0
Implementing Lightweight Intrusion Detection System on Resource Constrained DevicesCode0
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly DetectionCode0
Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection SystemsCode0
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternativesCode0
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion DetectionCode0
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection SystemsCode0
Separating Flows in Encrypted Tunnel TrafficCode0
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber SecurityCode0
PyOD 2: A Python Library for Outlier Detection with LLM-powered Model SelectionCode0
Enhanced Convolution Neural Network with Optimized Pooling and Hyperparameter Tuning for Network Intrusion DetectionCode0
Synthesis of a Machine Learning Model for Detecting Computer Attacks Based on the CICIDS2017 DatasetCode0
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion DetectionCode0
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion DetectionCode0
Large Language Models for Cyber Security: A Systematic Literature ReviewCode0
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?Code0
A Novel Multi-Stage Approach for Hierarchical Intrusion DetectionCode0
A Robust PPO-optimized Tabular Transformer Framework for Intrusion Detection in Industrial IoT SystemsCode0
Deep Learning Applications for Intrusion Detection in Network TrafficCode0
XAI-based Feature Selection for Improved Network Intrusion Detection SystemsCode0
Sparse Bayesian approach for metric learning in latent spaceCode0
Show:102550
← PrevPage 5 of 6Next →

No leaderboard results yet.