Results 71 to 80 of about 178,776 (288)

Strength through diversity: how cancers thrive when clones cooperate

open access: yesMolecular Oncology, EarlyView.
Intratumor heterogeneity can offer direct benefits to the tumor through cooperation between different clones. In this review, Kuiken et al. discuss existing evidence for clonal cooperativity to identify overarching principles, and highlight how novel technological developments could address remaining open questions.
Marije C. Kuiken   +3 more
wiley   +1 more source

Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems [PDF]

open access: green, 2023
Arvin Hekmati   +3 more
openalex   +1 more source

Time-Based GNSS Attack Detection

open access: yesIEEE Transactions on Aerospace and Electronic Systems
To safeguard Civilian Global Navigation Satellite Systems (GNSS) external information available to the platform encompassing the GNSS receiver can be used to detect attacks. Cross-checking the GNSS-provided time against alternative multiple trusted time sources can lead to attack detection aiming at controlling the GNSS receiver time.
Marco Spanghero, Panos Papadimitratos
openaire   +3 more sources

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency [PDF]

open access: green, 2023
Minkyoung Cho   +3 more
openalex   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Research on wormhole attacks in wireless mesh networks

open access: yesTongxin xuebao, 2011
In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh
FU Ying-fang1   +3 more
doaj   +2 more sources

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism

open access: yesTongxin xuebao
In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance ...
Yuancheng LI   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy