Results 81 to 90 of about 264,704 (267)
Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde +3 more
wiley +1 more source
Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection
As an artificial neural network method, self-organizing mapping facilities efficient complete and visualize high-dimensional data topology representation, valid in a number of applications such as network intrusion detection.
Xiaofei Qu +6 more
doaj +1 more source
Vectorized linear approximations for attacks on SNOW 3G
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard.
Jing Yang +2 more
doaj +1 more source
Distinguishing attack on five-round Feistel networks
Recently it was shown (by J. Patarin) how to distinguish a general five-round Feistel network from a random permutation using (23n/2) chosen plaintexts or (27n/4) known plaintexts. The present authors report improvement of these results and a distinguisher is presented which uses roughly 2n chosen plaintexts or roughly 23n/2 known plaintexts.
L. Knudsen, H. Raddum
openaire +1 more source
How Rational Is the Response of Individuals to the Threat of Terrorism in Europe? [PDF]
In this Policy Briefing, we address two important questions. We look at the drivers of concern about terrorism and find that beyond individual characteristics, it is also affected by the occurrence of terrorism.
Cathérine Müller +2 more
core
Enzymes of the 2‐hydroxyacyl‐CoA lyase group catalyze the condensation of formyl‐CoA with aldehydes or ketones. Thus, by structural adaptation of active sites, practically any pharmaceutically and industrially important 2‐hydroxyacid could be biotechnologically synthesized. Combining crystal structure analysis, active site mutations and kinetic assays,
Michael Zahn +4 more
wiley +1 more source
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental attacks which could only exploit cubes of size less than 40.
Ye, Chen-Dong, Tian, Tian
openaire +4 more sources
Secure voice based authentication for mobile devices: Vaulted Voice Verification
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices.
Boult, Terrance E. +2 more
core +1 more source
Systemic dysregulation of apolipoproteins in amyotrophic lateral sclerosis serum
Amyotrophic lateral sclerosis (ALS) is a fatal disease that damages motor neurons. This study found that people with ALS show significant changes in blood fats and the proteins that carry them. Several apolipoproteins were higher, lipid balances were altered, and normal protein–lipid relationships were disrupted.
Finula I. Isik +6 more
wiley +1 more source
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst +4 more
wiley +1 more source

