Results 61 to 70 of about 308,277 (215)
Background Querying drug-induced gene expression profiles with machine learning method is an effective way for revealing drug mechanism of actions (MOAs), which is strongly supported by the growth of large scale and high-throughput gene expression ...
Shengqiao Gao +7 more
doaj +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
Background Acute hypobaric hypoxia-induced brain injury has been a challenge in the health management of mountaineers; therefore, new neuroprotective agents are urgently required.
Fengying Liu +11 more
doaj +1 more source
Phase-separated films of water-insoluble ethyl cellulose (EC) and water-soluble hydroxypropyl cellulose (HPC) can be utilized to tailor drug release from coated pellets. In the present study, the effects of HPC levels and the pH, type, ionic strength and
Lu Chen +9 more
doaj +1 more source
On Ladder Logic Bombs in Industrial Control Systems
In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e.
D-Y Kim +5 more
core +1 more source
Spaceflight medical countermeasures: a strategic approach for mitigating effects from solar particle events [PDF]
Lisa S. Carnell
openalex +1 more source
CIDPro: Custom Instructions for Dynamic Program Diversification
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar +4 more
core +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Background: Pulmonary fibrosis (PF) is a progressive and fatal lung disorder, and emerging evidence suggests that dysregulation of peroxisome proliferator-activated receptor gamma (PPARγ) plays a critical role in its pathogenesis.
Xueyang Lin +17 more
doaj +1 more source
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech +2 more
core +2 more sources

