Network Intrusion Detection

This cluster covers techniques and systems designed to detect and prevent unauthorized access to network infrastructures. It evaluates various anomaly detection models and data characterization methods to enhance cybersecurity.

Network Security
Intrusion Detection
Anomaly Detection
Cybersecurity
Data Processing

47,662 papers

Parent topic: Intelligent Systems and Learning

AI-assisted content · The overview, paper groupings, and influence analysis on this page are AI-generated. They are intended as a starting point for exploring the field and may contain inaccuracies. Report an error

Papers Over Time

1930194019501960197019801990200020102020

Top Papers

Anomaly Detection

2009 · 7,428 citations

An Intrusion-Detection Model

1987 · 1,999 citations

Isolation-Based Anomaly Detection

2012 · 1,271 citations