usfAD Based Effective Unknown Attack Detection Focused IDS Framework Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 DDoS Attack DetectionIntrusion Detection SystemUnknown Attack Detection 2024.03.17 2025.05.27 Literature Database
ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments Authors: Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic | Published: 2024-03-06 Zero TrustNetwork SlicingIntrusion Detection System 2024.03.06 2025.05.27 Literature Database
IT Intrusion Detection Using Statistical Learning and Testbed Measurements Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20 CVE Information ExtractionIntrusion Detection SystemAttack Method 2024.02.20 2025.05.27 Literature Database
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 Data PreprocessingModel Performance EvaluationIntrusion Detection System 2024.02.17 2025.05.27 Literature Database
On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15 Dataset GenerationIntrusion Detection SystemAttack Evaluation 2024.02.15 2025.05.27 Literature Database
Utilizing Deep Learning for Enhancing Network Resilience in Finance Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18 Network Threat DetectionIntrusion Detection SystemDeep Learning Method 2024.02.15 2025.05.27 Literature Database
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13 CybersecurityData CollectionIntrusion Detection System 2024.02.13 2025.05.27 Literature Database
Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol Authors: Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, Carmen Benavides | Published: 2024-02-05 DoS AttackIntrusion Detection SystemComputational Complexity 2024.02.05 2025.05.27 Literature Database
X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System Authors: Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, Sule Gunduz Oguducu | Published: 2024-02-01 | Updated: 2024-06-02 Graph Neural NetworkXAI (Explainable AI)Intrusion Detection System 2024.02.01 2025.05.27 Literature Database
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni | Published: 2024-01-22 WatermarkingModel Performance EvaluationIntrusion Detection System 2024.01.22 2025.05.27 Literature Database