Results 251 to 260 of about 7,761,143 (347)
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
Optimization design and application of library face recognition access control system based on improved PCA. [PDF]
Lin N, Ding Y, Tan Y.
europepmc +1 more source
Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study. [PDF]
Rahaman MS, Tisha SN, Song E, Cerny T.
europepmc +1 more source
Engineering access control for distributed enterprise applications
Konstantin Beznosov
openalex +2 more sources
The complex mode of action of the topoisomerase II inhibitor etoposide in triggering apoptosis involves several mechanisms: overexpression of the mitochondrial protein VDAC1, leading to its oligomerization and formation of a large channel that mediates the release of pro‐apoptotic protein; and overexpression of the apoptosis regulators p53, Bax, and ...
Aditya Karunanithi Nivedita+1 more
wiley +1 more source
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment. [PDF]
Nie S, Ren J, Wu R, Han P, Han Z, Wan W.
europepmc +1 more source
Retracted: On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment. [PDF]
Intelligence And Neuroscience C.
europepmc +1 more source
A quantitative comparison of multiple access control protocols for wireless ATM [PDF]
Yu‐Kwong Kwok, Vincent K. N. Lau
openalex +1 more source
NAD+ regeneration by mitochondrial complex I NADH dehydrogenase is important for cancer cell proliferation. Specifically, NAD+ is necessary for the activities of NAD+‐dependent deacetylases SIRT3 and SIRT7, which suppress the expression of p21Cip1 cyclin‐dependent kinase inhibitor, an antiproliferative molecule, at the translational and transcriptional
Masato Higurashi+5 more
wiley +1 more source
BACAD: AI-based framework for detecting vertical broken access control attacks
Vertical Broken Access Control (VBAC) vulnerability is one of the most commonly identified issues in web applications, posing significant risks. Consequently, addressing this pervasive threat is crucial for ensuring system confidentiality and integrity ...
Ahmed Anas+3 more
doaj