Results 71 to 80 of about 811,171 (213)

Host security threat analysis approach for network dynamic defense

open access: yes网络与信息安全学报, 2018
Calculating the host security threat in network dynamic defense (NDD) situation has to consider the vulnerabilities’ uncertainty because of dynamic mutation.Firstly,the vulnerabilities’ uncertainty caused by the mutation space and the mutation period was
Lixun LI,Bin ZHANG,Shuqin DONG
doaj   +3 more sources

Ghost in the Radio: An Audio Adversarial Attack Using Environmental Noise Through Radio

open access: yesIEEE Access
Many automatic speech recognition (ASR) systems provide functions such as sending messages or opening garage doors. If such a system malfunctions, it could pose a significant threat.
Hyeongjun Choi   +2 more
doaj   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells

open access: yesMolecular Oncology, EarlyView.
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos   +6 more
wiley   +1 more source

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

Wind-Tunnel Investigation of an Advanced General Aviation Canard Configuration [PDF]

open access: yes
Wind-tunnel tests of a model of an advanced canard configuration designed for general aviation were conducted in the Langley 30- by 60-Foot Tunnel. The objective of the tests was to determine the aerodynamic stability and control characteristics of the ...
Chambers, J. R., Moul, T. M., Yip, L. P.
core   +1 more source

CAPABARA: A Combined Attack on CAPA

open access: yes
sponsorship: This work was supported by CyberSecurity Research Flanders with reference number VR20192203. (CyberSecurity Research Flanders|VR20192203)
Toprakhisar, Dilara   +2 more
openaire   +2 more sources

Combined Attack on CRT-RSA [PDF]

open access: yes, 2013
This article introduces a new Combined Attack on a CRT-RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation.
Barbu, Guillaume   +6 more
openaire   +2 more sources

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

A Hybrid Adversarial Attack for Different Application Scenarios

open access: yesApplied Sciences, 2020
Adversarial attack against natural language has been a hot topic in the field of artificial intelligence security in recent years. It is mainly to study the methods and implementation of generating adversarial examples. The purpose is to better deal with
Xiaohu Du   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy