Results 41 to 50 of about 72,081 (273)

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Covert Capacity of Non-Coherent Rayleigh-Fading Channels

open access: yes, 2019
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R.   +2 more
core   +2 more sources

Covert Channels on GPGPUs

open access: yesIEEE Computer Architecture Letters, 2017
GPUs are increasingly used to accelerate the performance of not only graphics workloads, but also data intensive applications. In this paper, we explore the feasibility of covert channels in General Purpose Graphics Processing Units (GPGPUs). We consider the possibility of two colluding malicious applications using the GPGPU as a covert channel to ...
Hoda Naghibijouybari, Nael Abu-Ghazaleh
openaire   +1 more source

Practical covert channels for WiFi systems [PDF]

open access: yes2015 IEEE Conference on Communications and Network Security (CNS), 2015
Wireless covert channels promise to exfiltrate information with high bandwidth by circumventing traditional access control mechanisms. Ideally, they are only accessible by the intended recipient and---for regular system users/operators---indistinguishable from normal operation.
Classen, Jiska   +2 more
openaire   +2 more sources

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Covert Communication over Adversarially Jammed Channels [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
Suppose that a transmitter Alice potentially wishes to communicate with a receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits based on his observations. We consider a
Qiaosheng Zhang   +2 more
openaire   +2 more sources

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Covert Channel Detection: Machine Learning Approaches

open access: yesIEEE Access, 2022
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever.
Muawia A. Elsadig, Ahmed Gafar
doaj   +1 more source

A Covert Channel Using Named Resources [PDF]

open access: yes, 2014
A network covert channel is created that uses resource names such as addresses to convey information, and that approximates typical user behavior in order to blend in with its environment.
Davis, Joshua, Frost, Victor S.
core  

Covert communications on renewal packet channels [PDF]

open access: yes2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy