Results 61 to 70 of about 5,572,769 (345)

The nicotinamide hypothesis revisited—plant defense signaling integrating PARP, nicotinamide, nicotinic acid, epigenetics, and glutathione

open access: yesFEBS Letters, EarlyView.
Nicotinamide (NIC) and nicotinic acid (NIA) are proposed as stress signaling compounds in plants. Oxidative stress may lead to single strand breaks (SSB) in DNA, which activate poly(ADP‐ribose) polymerase (PARP). NIC and NIA are then formed from NAD. NIC and NIA can promote epigenetic changes leading to the expression of defense genes specific for the ...
Torkel Berglund, Anna B. Ohlsson
wiley   +1 more source

Fingerprinting with Minimum Distance Decoding

open access: yes, 2007
This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates.
Gamal, Hesham El   +2 more
core   +2 more sources

Mechanistic basis for inhibition of the extended‐spectrum β‐lactamase GES‐1 by enmetazobactam and tazobactam

open access: yesFEBS Letters, EarlyView.
Antimicrobial resistance (AMR) is of huge importance, resulting in over 1 million deaths each year. Here, we describe how a new drug, enmetazobactam, designed to help fight resistant bacterial diseases, inhibits a key enzyme (GES‐1) responsible for AMR. Our data show it is a more potent inhibitor than the related tazobactam, with high‐level computation
Michael Beer   +10 more
wiley   +1 more source

Risk assessment method for network attack surface based on Bayesian attack graph

open access: yes网络与信息安全学报, 2018
Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network ...
Yuyang ZHOU, Guang CHENG, Chunsheng GUO
doaj   +3 more sources

MicroRNA 196a contributes to the aggressiveness of esophageal adenocarcinoma through the MYC/TERT/NFκB axis

open access: yesMolecular Oncology, EarlyView.
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo   +8 more
wiley   +1 more source

Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection

open access: yesTongxin xuebao, 2006
Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. In order to solve the problem, an algorithm
MA Lin-ru1   +3 more
doaj   +2 more sources

Association of high‐dose radioactive iodine therapy with PPM1D‐mutated clonal hematopoiesis in older individuals

open access: yesMolecular Oncology, EarlyView.
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim   +11 more
wiley   +1 more source

Attack detection method based on spatiotemporal event correlation in intranet environment

open access: yesTongxin xuebao, 2020
In view of the fact that a single event as an attack detection feature leads to a higher false positive rate,an intranet attack detection method using Bayesian network model for cross-space event correlation and Kalman filter linear model for cross ...
Wei SUN   +3 more
doaj   +2 more sources

Searching for the optimum correlation attack [PDF]

open access: yes, 1995
We present some new ideas on attacking stream ciphers based on regularly clocked shift registers. The nonlinear filter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream and the underlying shift register sequence.
openaire   +2 more sources

Correlation-based Detection of LDoS Attack

open access: yesJournal of Software, 2012
Low-rate Denial of Service (LDoS) attack and TCP flows are simulated in the time and frequency domain for the purpose of analyzing their signatures and extracting period T and duration L of LDoS attack, which are two correlative parameters used in the proposed detecting approach.
Minghua Wang   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy