Results 111 to 120 of about 2,694,917 (322)

Overcoming Illegal Cross-border Transfer of Personal Data

open access: yesJournal of Digital Technologies and Law
Objective: to form of a comprehensive interdisciplinary legal and technological risk management model in the field of illegal cross-border transfer of personal data by eliminating legislative gaps and creating a system for automated control of outgoing ...
D. V. Bakhteev   +2 more
doaj   +1 more source

Efficiency in the use of a computer for network analysis [PDF]

open access: yes
Efficiency in use of digital computer for network ...
Chan, S. P., Munoz, R. M.
core   +1 more source

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Molecular characterisation of human penile carcinoma and generation of paired epithelial primary cell lines

open access: yesMolecular Oncology, EarlyView.
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad   +12 more
wiley   +1 more source

Large scale network worm detection using automatic signature extraction

open access: yesTongxin xuebao, 2006
Worms had done serious harm to the computer networks due to their propagating speeds.The research was necessary to detect worms quickly and automatically.In large scale networks,flux based anomaly found module was used to screen out anomalous network ...
WANG Ping, FANG Bin-xing, YUN Xiao-chun
doaj  

SPAN security policies and guidelines [PDF]

open access: yes
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core   +1 more source

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy