Intrusion detection system using PCA with random forest approach

S Waskle, L Parashar, U Singh - … International Conference on …, 2020 - ieeexplore.ieee.org
With the evolution in wireless communication, there are many security threats over the
internet. The intrusion detection system (IDS) helps to find the attacks on the system and the …

Automated water recycle (AWR) method for dust removal from rooftop photovoltaic (PV) at Johor, Malaysia

SZ Islam, NS Izzati, MN Abdullah, MS Kamarudin… - SN Applied …, 2022 - Springer
Wet dust on the Photovoltaic (PV) surface is a persistent problem that is merely considered
for rooftop based PV cleaning under a high humid climate like Malaysia. This paper …

Intrusion Detection System Using Web Application

M Sambath, B Hemanthraju… - 2024 Ninth International …, 2024 - ieeexplore.ieee.org
Over time, the amount of information handled over the Web has increased due to the
consistent growth in the application of innovation. The massive amount of data being …

41 Analysis on an enhanced safe and secured intrusion detection system with a machine learning methodology

KV Rao, S Kumar, K Shilpa… - … of Mathematics in …, 2025 - books.google.com
On the web, one may occasionally come across sporadic malicious behaviors that affect a
single system or the entire network. It's getting harder to keep up with the unprecedented …

Decision trees to detect malware in cloud computing environment

P Ayyappa, GKK Reddy, KS Satish… - … and Security Volume …, 2024 - taylorfrancis.com
The internet has become a source of many security threats with the development of wireless
communication. Malware detection system (MDS) finds attacks on a system and is able to …

[PDF][PDF] Network Intrusion System Using PCA and Random Forest

I Adak - ijaem.net
Due to the advancement of wireless communication, there are several online security risks.
The intrusion detection system (IDS) assists in identifying system attacks and identifies …

[PDF][PDF] CYBER SECURITY OF MOBILE APPLICATION USING ARTIFICIAL INTELLIGENCE TADIPATRI ENGINERING COLLEGE COMPUTER SCIENCE …

MRK MANIKANTA, A PROFF - Journal of Nonlinear Analysis and …, 2024 - jnao-nu.com
With the development of wireless communications, many protection threats have arisen on
the Internet. Intrusion detection systems (IDS) assist detect attacks on computers and …

[SITAT][C] PHISHING DETECTION WITH SUPPORT VECTOR MACHINE

R Vijyalakshmi, A Gobika, G Lakshmi, M Gayathri