Results 91 to 100 of about 574,096 (277)

Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism

open access: yesTongxin xuebao
In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance ...
Yuancheng LI   +3 more
doaj   +2 more sources

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer

open access: yesMolecular Oncology, EarlyView.
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley   +1 more source

Multi-type low-rate DDoS attack detection method based on hybrid deep learning

open access: yes网络与信息安全学报, 2022
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI   +3 more
doaj  

Unorganized Malicious Attacks Detection

open access: yesCoRR, 2016
Recommender system has attracted much attention during the past decade. Many attack detection algorithms have been developed for better recommendations, mostly focusing on shilling attacks, where an attack organizer produces a large number of user profiles by the same strategy to promote or demote an item.
Ming Pang   +3 more
openaire   +3 more sources

dUTPase is essential in zebrafish development and possesses several single‐nucleotide variants with pronounced structural and functional consequences

open access: yesFEBS Open Bio, EarlyView.
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon   +6 more
wiley   +1 more source

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

open access: yesFuture Internet, 2019
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang   +3 more
doaj   +1 more source

Attack Detection in Wireless Localization

open access: yesIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007
Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, the localization infrastructure can be subjected to non-cryptographic attacks, such as signal attenuation and amplification, that cannot be addressed by traditional security ...
Yingying Chen 0001   +2 more
openaire   +1 more source

Microglial dynamics and ferroptosis induction in human iPSC‐derived neuron–astrocyte–microglia tri‐cultures

open access: yesFEBS Open Bio, EarlyView.
A tri‐culture of iPSC‐derived neurons, astrocytes, and microglia treated with ferroptosis inducers as an Induced ferroptosis model was characterized by scRNA‐seq, cell survival, and cytokine release assays. This analysis revealed diverse microglial transcriptomic changes, indicating that the system captures key aspects of the complex cellular ...
Hongmei Lisa Li   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy