Results 41 to 50 of about 72,081 (273)
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Covert Capacity of Non-Coherent Rayleigh-Fading Channels
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R. +2 more
core +2 more sources
GPUs are increasingly used to accelerate the performance of not only graphics workloads, but also data intensive applications. In this paper, we explore the feasibility of covert channels in General Purpose Graphics Processing Units (GPGPUs). We consider the possibility of two colluding malicious applications using the GPGPU as a covert channel to ...
Hoda Naghibijouybari, Nael Abu-Ghazaleh
openaire +1 more source
Practical covert channels for WiFi systems [PDF]
Wireless covert channels promise to exfiltrate information with high bandwidth by circumventing traditional access control mechanisms. Ideally, they are only accessible by the intended recipient and---for regular system users/operators---indistinguishable from normal operation.
Classen, Jiska +2 more
openaire +2 more sources
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source
Covert Communication over Adversarially Jammed Channels [PDF]
Suppose that a transmitter Alice potentially wishes to communicate with a receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits based on his observations. We consider a
Qiaosheng Zhang +2 more
openaire +2 more sources
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Covert Channel Detection: Machine Learning Approaches
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever.
Muawia A. Elsadig, Ahmed Gafar
doaj +1 more source
A Covert Channel Using Named Resources [PDF]
A network covert channel is created that uses resource names such as addresses to convey information, and that approximates typical user behavior in order to blend in with its environment.
Davis, Joshua, Frost, Victor S.
core
Covert communications on renewal packet channels [PDF]
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin +3 more
openaire +2 more sources

