Results 111 to 120 of about 2,694,917 (322)
Overcoming Illegal Cross-border Transfer of Personal Data
Objective: to form of a comprehensive interdisciplinary legal and technological risk management model in the field of illegal cross-border transfer of personal data by eliminating legislative gaps and creating a system for automated control of outgoing ...
D. V. Bakhteev +2 more
doaj +1 more source
Efficiency in the use of a computer for network analysis [PDF]
Efficiency in use of digital computer for network ...
Chan, S. P., Munoz, R. M.
core +1 more source
Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son +13 more
wiley +1 more source
Towards Approaches to Continuous Assessment of Cyber Risk in Security of Computer Networks [PDF]
Alexander Kott, Curtis Arnold
openalex +1 more source
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
Large scale network worm detection using automatic signature extraction
Worms had done serious harm to the computer networks due to their propagating speeds.The research was necessary to detect worms quickly and automatically.In large scale networks,flux based anomaly found module was used to screen out anomalous network ...
WANG Ping, FANG Bin-xing, YUN Xiao-chun
doaj
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck +12 more
wiley +1 more source

