Results 71 to 80 of about 154,545 (256)
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source
CCM-FL: Covert communication mechanisms for federated learning in crowd sensing IoT
The past decades have witnessed a wide application of federated learning in crowd sensing, to handle the numerous data collected by the sensors and provide the users with precise and customized services.
Hongruo Zhang +4 more
doaj +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Research on multi-address time-based blockchain covert communication method
Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by ...
Dongyan HUANG, Kun LI
doaj +2 more sources
Covert actions: 'Alternative approaches' of intelligence services' activity [PDF]
Countries have always used secret means to influence situations and events in the world, and eventually these have become one of characteristic features of the government system. Covert actions, i.e.
Krstić Marko M.
doaj +1 more source
Covert channel detection using Information Theory
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core +3 more sources
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Study on Airspace Covert Communication Algorithm of Covert Communication System
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and ...
openaire +1 more source

