Results 51 to 60 of about 178,776 (288)

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Attack simulation and signature extraction of low-rate DDoS

open access: yesTongxin xuebao, 2008
LDDoS (low-rate distributed denial-of-service) was a new type of DDoS attack. It had small traffic and cov- ered by normal network traffic. LDDoS attack was so stealthy that the detection and defense approaches of traditional DDoS could not be effective.
WU Zhi-jun, ZHANG Dong
doaj   +2 more sources

ATTACK DETECTION SYSTEMS

open access: yes, 2022
An intrusion detection system is a software or hardware tool designed to detect unauthorized access to or control of a computer system or network, mainly via the Internet. Today, there are several types of IDS that differ in their monitoring and analysis methods. Each approach has its own advantages and disadvantages. In addition, all approaches can be
openaire   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung   +3 more
doaj   +1 more source

Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

open access: yesEnergies, 2012
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard.
JungChan Na   +5 more
doaj   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT

open access: yesIEEE Access
Machine learning-based Distributed Denial of Service (DDoS) attack detection systems have proven effective in detecting and preventing DDoD attacks in Internet of Things (IoT) systems.
Yonas Kibret Beshah   +2 more
doaj   +1 more source

SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing

open access: yesInformation, 2020
Mobile crowdsensing is a data collection system using widespread mobile devices with various sensors. The data processor cannot manage all mobile devices participating in mobile crowdsensing.
Junhyeok Yun, Mihui Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy