| Active Learning for Network Intrusion Detection | Apr 2, 2019 | Active LearningAnomaly Detection | —Unverified | 0 | 0 |
| Rallying Adversarial Techniques against Deep Learning for Network Security | Mar 27, 2019 | BIG-bench Machine LearningDeep Learning | —Unverified | 0 | 0 |
| Real-time Network Intrusion Detection via Decision Transformers | Dec 12, 2023 | Decision MakingIntrusion Detection | —Unverified | 0 | 0 |
| Real-time Regular Expression Matching | Aug 20, 2023 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| A Deep Belief Network Based Machine Learning System for Risky Host Detection | Dec 29, 2017 | BIG-bench Machine LearningFeature Engineering | —Unverified | 0 | 0 |
| Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems | Dec 4, 2020 | Deep LearningIntrusion Detection | —Unverified | 0 | 0 |
| Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems | Mar 13, 2023 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture | Nov 27, 2023 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning | Dec 21, 2020 | Deep LearningIntrusion Detection | —Unverified | 0 | 0 |
| A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset | Dec 29, 2020 | Anomaly DetectionBenchmarking | —Unverified | 0 | 0 |
| SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection | Feb 10, 2025 | Anomaly DetectionIntrusion Detection | —Unverified | 0 | 0 |
| Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System | Dec 3, 2021 | Feature EngineeringIntrusion Detection | —Unverified | 0 | 0 |
| SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification | Nov 19, 2023 | Intrusion DetectionLanguage Modeling | —Unverified | 0 | 0 |
| Security Evaluation of Pattern Classifiers under Attack | Sep 2, 2017 | ClassificationGeneral Classification | —Unverified | 0 | 0 |
| Segmented Federated Learning for Adaptive Intrusion Detection System | Jul 2, 2021 | Federated LearningIntrusion Detection | —Unverified | 0 | 0 |
| Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System | Oct 5, 2023 | Adversarial AttackData Augmentation | —Unverified | 0 | 0 |
| A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS | Jun 7, 2019 | Anomaly DetectionIntrusion Detection | —Unverified | 0 | 0 |
| Sequential Binary Classification for Intrusion Detection | Jun 10, 2024 | Binary ClassificationClassification | —Unverified | 0 | 0 |
| A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection | Nov 4, 2021 | Federated LearningIntrusion Detection | —Unverified | 0 | 0 |
| SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection | Aug 13, 2023 | Anomaly DetectionIntrusion Detection | —Unverified | 0 | 0 |
| Sorting out typicality with the inverse moment matrix SOS polynomial | Jun 13, 2016 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks | Dec 7, 2018 | Anomaly DetectionDiagnostic | —Unverified | 0 | 0 |
| Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection | Oct 15, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems | Jul 11, 2022 | Autonomous VehiclesIntrusion Detection | —Unverified | 0 | 0 |
| Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning | Jun 4, 2024 | Few-Shot LearningIntrusion Detection | —Unverified | 0 | 0 |
| Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review | Apr 11, 2021 | Feature Correlationfeature selection | —Unverified | 0 | 0 |
| Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process | Jan 27, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| SynGAN: Towards Generating Synthetic Network Attacks using GANs | Aug 26, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| V-CNN: When Convolutional Neural Network encounters Data Visualization | Jun 12, 2018 | Data VisualizationDeep Learning | —Unverified | 0 | 0 |
| WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems | Apr 6, 2025 | Federated LearningIntrusion Detection | —Unverified | 0 | 0 |
| Anomaly Detection via Minimum Likelihood Generative Adversarial Networks | Aug 1, 2018 | Anomaly DetectionIntrusion Detection | —Unverified | 0 | 0 |
| A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach | Aug 3, 2022 | Binary ClassificationDeep Learning | —Unverified | 0 | 0 |
| A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks | Jul 31, 2023 | Adversarial AttackIntrusion Detection | —Unverified | 0 | 0 |
| Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic | Aug 28, 2024 | Binary ClassificationClassification | —Unverified | 0 | 0 |
| A Novel Resampling Technique for Imbalanced Dataset Optimization | Dec 30, 2020 | Intrusion DetectionMalware Detection | —Unverified | 0 | 0 |
| Cybersecurity Anomaly Detection in Adversarial Environments | May 14, 2021 | Anomaly DetectionBIG-bench Machine Learning | —Unverified | 0 | 0 |
| TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems | Oct 27, 2022 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems | Mar 26, 2025 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms | Dec 31, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning | Oct 17, 2019 | Fraud DetectionGeneral Classification | —Unverified | 0 | 0 |
| ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors | Oct 23, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| Assessing Cyclostationary Malware Detection via Feature Selection and Classification | Aug 29, 2023 | Anomaly DetectionClassification | —Unverified | 0 | 0 |
| Anomaly based network intrusion detection for IoT attacks using deep learning technique | Feb 16, 2023 | feature selectionIntrusion Detection | —Unverified | 0 | 0 |
| A Survey for Deep Reinforcement Learning Based Network Intrusion Detection | Sep 25, 2024 | Deep Reinforcement Learningfeature selection | —Unverified | 0 | 0 |
| A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI | Jun 3, 2024 | Intrusion DetectionLogical Reasoning | —Unverified | 0 | 0 |
| TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack | Mar 10, 2021 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| A Temporal Convolutional Network-based Approach for Network Intrusion Detection | Dec 23, 2024 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| A Transfer Learning Approach for Network Intrusion Detection | Sep 5, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 | 0 |
| Attribute Learning for Network Intrusion Detection | Jul 28, 2016 | AttributeIntrusion Detection | —Unverified | 0 | 0 |
| A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems | Apr 28, 2025 | Decision MakingIntrusion Detection | —Unverified | 0 | 0 |