Large Language Models powered Network Attack Detection: Architecture, Opportunities and Case Study Authors: Xinggong Zhang, Qingyang Li, Yunpeng Tan, Zongming Guo, Lei Zhang, Yong Cui | Published: 2025-03-24 Prompt InjectionPrompt leakingIntrusion Detection System 2025.03.24 2025.05.27 Literature Database
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06 Intrusion Detection SystemAdversarial TrainingThreat modeling 2024.04.06 2025.05.27 Literature Database
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks Authors: Abdullah H Alqahtani | Published: 2024-04-01 Online LearningIntrusion Detection SystemAnomaly Detection Method 2024.04.01 2025.05.27 Literature Database
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23 Intrusion Detection SystemAdversarial TrainingStructural Attack 2024.03.18 2025.05.27 Literature Database
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Intrusion Detection SystemUnknown Attack DetectionHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
usfAD Based Effective Unknown Attack Detection Focused IDS Framework Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 DDoS Attack DetectionIntrusion Detection SystemUnknown Attack Detection 2024.03.17 2025.05.27 Literature Database
ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments Authors: Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic | Published: 2024-03-06 Zero TrustNetwork SlicingIntrusion Detection System 2024.03.06 2025.05.27 Literature Database
IT Intrusion Detection Using Statistical Learning and Testbed Measurements Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20 CVE Information ExtractionIntrusion Detection SystemAttack Method 2024.02.20 2025.05.27 Literature Database
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 Data PreprocessingModel Performance EvaluationIntrusion Detection System 2024.02.17 2025.05.27 Literature Database
On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15 Dataset GenerationIntrusion Detection SystemAttack Evaluation 2024.02.15 2025.05.27 Literature Database