Network Intrusion Detection


Network intrusion detection is the process of identifying and preventing unauthorized access to computer networks.

Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS

Add code
Sep 11, 2024
Figure 1 for Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS
Figure 2 for Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS
Figure 3 for Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS
Figure 4 for Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS
Viaarxiv icon

Data Distribution Valuation

Add code
Oct 06, 2024
Figure 1 for Data Distribution Valuation
Figure 2 for Data Distribution Valuation
Figure 3 for Data Distribution Valuation
Figure 4 for Data Distribution Valuation
Viaarxiv icon

Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS

Add code
Jan 31, 2025
Figure 1 for Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS
Figure 2 for Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS
Figure 3 for Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS
Figure 4 for Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS
Viaarxiv icon

Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis

Add code
Feb 28, 2025
Figure 1 for Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Figure 2 for Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Figure 3 for Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Figure 4 for Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Viaarxiv icon

KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data

Add code
Oct 10, 2024
Figure 1 for KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Figure 2 for KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Figure 3 for KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Figure 4 for KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Viaarxiv icon

Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection

Add code
Nov 04, 2024
Figure 1 for Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
Figure 2 for Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
Figure 3 for Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
Figure 4 for Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
Viaarxiv icon

Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks

Add code
Nov 27, 2024
Figure 1 for Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks
Figure 2 for Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks
Figure 3 for Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks
Figure 4 for Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks
Viaarxiv icon

XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language Model

Add code
Aug 27, 2024
Viaarxiv icon

Estimating Vehicle Speed on Roadways Using RNNs and Transformers: A Video-based Approach

Add code
Feb 21, 2025
Viaarxiv icon

Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications

Add code
Nov 28, 2024
Figure 1 for Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications
Figure 2 for Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications
Figure 3 for Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications
Figure 4 for Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications
Viaarxiv icon