Results 71 to 80 of about 811,171 (213)
Host security threat analysis approach for network dynamic defense
Calculating the host security threat in network dynamic defense (NDD) situation has to consider the vulnerabilities’ uncertainty because of dynamic mutation.Firstly,the vulnerabilities’ uncertainty caused by the mutation space and the mutation period was
Lixun LI,Bin ZHANG,Shuqin DONG
doaj +3 more sources
Ghost in the Radio: An Audio Adversarial Attack Using Environmental Noise Through Radio
Many automatic speech recognition (ASR) systems provide functions such as sending messages or opening garage doors. If such a system malfunctions, it could pose a significant threat.
Hyeongjun Choi +2 more
doaj +1 more source
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source
COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan +4 more
doaj +1 more source
Wind-Tunnel Investigation of an Advanced General Aviation Canard Configuration [PDF]
Wind-tunnel tests of a model of an advanced canard configuration designed for general aviation were conducted in the Langley 30- by 60-Foot Tunnel. The objective of the tests was to determine the aerodynamic stability and control characteristics of the ...
Chambers, J. R., Moul, T. M., Yip, L. P.
core +1 more source
CAPABARA: A Combined Attack on CAPA
sponsorship: This work was supported by CyberSecurity Research Flanders with reference number VR20192203. (CyberSecurity Research Flanders|VR20192203)
Toprakhisar, Dilara +2 more
openaire +2 more sources
Combined Attack on CRT-RSA [PDF]
This article introduces a new Combined Attack on a CRT-RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation.
Barbu, Guillaume +6 more
openaire +2 more sources
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
A Hybrid Adversarial Attack for Different Application Scenarios
Adversarial attack against natural language has been a hot topic in the field of artificial intelligence security in recent years. It is mainly to study the methods and implementation of generating adversarial examples. The purpose is to better deal with
Xiaohu Du +6 more
doaj +1 more source

