Results 61 to 70 of about 5,572,769 (345)
Nicotinamide (NIC) and nicotinic acid (NIA) are proposed as stress signaling compounds in plants. Oxidative stress may lead to single strand breaks (SSB) in DNA, which activate poly(ADP‐ribose) polymerase (PARP). NIC and NIA are then formed from NAD. NIC and NIA can promote epigenetic changes leading to the expression of defense genes specific for the ...
Torkel Berglund, Anna B. Ohlsson
wiley +1 more source
Fingerprinting with Minimum Distance Decoding
This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates.
Gamal, Hesham El +2 more
core +2 more sources
Antimicrobial resistance (AMR) is of huge importance, resulting in over 1 million deaths each year. Here, we describe how a new drug, enmetazobactam, designed to help fight resistant bacterial diseases, inhibits a key enzyme (GES‐1) responsible for AMR. Our data show it is a more potent inhibitor than the related tazobactam, with high‐level computation
Michael Beer +10 more
wiley +1 more source
Risk assessment method for network attack surface based on Bayesian attack graph
Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network ...
Yuyang ZHOU, Guang CHENG, Chunsheng GUO
doaj +3 more sources
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo +8 more
wiley +1 more source
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. In order to solve the problem, an algorithm
MA Lin-ru1 +3 more
doaj +2 more sources
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim +11 more
wiley +1 more source
Attack detection method based on spatiotemporal event correlation in intranet environment
In view of the fact that a single event as an attack detection feature leads to a higher false positive rate,an intranet attack detection method using Bayesian network model for cross-space event correlation and Kalman filter linear model for cross ...
Wei SUN +3 more
doaj +2 more sources
Searching for the optimum correlation attack [PDF]
We present some new ideas on attacking stream ciphers based on regularly clocked shift registers. The nonlinear filter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream and the underlying shift register sequence.
openaire +2 more sources
Correlation-based Detection of LDoS Attack
Low-rate Denial of Service (LDoS) attack and TCP flows are simulated in the time and frequency domain for the purpose of analyzing their signatures and extracting period T and duration L of LDoS attack, which are two correlative parameters used in the proposed detecting approach.
Minghua Wang +3 more
openaire +2 more sources

