This paper analyses intrusion detection techniques and provides recommendations for preventing intrusions in peer-to-peer wireless networks. Peer-to-peer wireless networks are particularly vulnerable to attack due to their openness, dynamically changing topology, collaborative algorithms, lack of centralised monitoring, centralised control point and lack of clear protection. Intrusion detection techniques exist in wired networks but they are not applicable in wireless environment. The paper also presents a new intrusion defence method based on intrusion detection in peer-to-peer wireless networks.
Keywords: security, vulnerability, information protection, attack, intrusion, wireless network, mobile network, detection system, IDS, MANET, DoS, DDoS
This paper presents the process of developing an algorithm that is able to extract style and content from two different images and create a new image, preserving the content structure of one image and simultaneously applying the stylistic characteristics of the other image. This algorithm is able to adapt the style of one image to the content of the other image, creating unique artworks.
Keywords: neural networks, style transfer, image, machine learning, algorithm, dataset, software
Security vulnerabilities are always a burning issue that website administrators spend a lot of time on researching in order to keep the website running securely. These vulnerabilities allow hackers to exploit, attack, infiltrate and influence the data of any company's websites. For stable, smooth and secure website operation, it is necessary to know the basic information about website security vulnerabilities. This article analyses the methods of detecting website vulnerabilities and applying effective measures to ensure website security. The article provides current challenges in the field of information security, describes methods of vulnerability detection and gives recommendations for the application of specific measures to secure websites.
Keywords: website security, vulnerability, information security, code, software, security vulnerability scanning