Results 81 to 90 of about 264,704 (267)

Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes

open access: yesFEBS Open Bio, EarlyView.
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde   +3 more
wiley   +1 more source

Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection

open access: yesIEEE Access, 2019
As an artificial neural network method, self-organizing mapping facilities efficient complete and visualize high-dimensional data topology representation, valid in a number of applications such as network intrusion detection.
Xiaofei Qu   +6 more
doaj   +1 more source

Vectorized linear approximations for attacks on SNOW 3G

open access: yesIACR Transactions on Symmetric Cryptology, 2020
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard.
Jing Yang   +2 more
doaj   +1 more source

Distinguishing attack on five-round Feistel networks

open access: yesElectronics Letters, 2003
Recently it was shown (by J. Patarin) how to distinguish a general five-round Feistel network from a random permutation using (23n/2) chosen plaintexts or (27n/4) known plaintexts. The present authors report improvement of these results and a distinguisher is presented which uses roughly 2n chosen plaintexts or roughly 23n/2 known plaintexts.
L. Knudsen, H. Raddum
openaire   +1 more source

How Rational Is the Response of Individuals to the Threat of Terrorism in Europe? [PDF]

open access: yes
In this Policy Briefing, we address two important questions. We look at the drivers of concern about terrorism and find that beyond individual characteristics, it is also affected by the occurrence of terrorism.
Cathérine Müller   +2 more
core  

C2α‐carbanion‐protonating glutamate discloses tradeoffs between substrate accommodation and reaction rate in actinobacterial 2‐hydroxyacyl‐CoA lyase

open access: yesFEBS Open Bio, EarlyView.
Enzymes of the 2‐hydroxyacyl‐CoA lyase group catalyze the condensation of formyl‐CoA with aldehydes or ketones. Thus, by structural adaptation of active sites, practically any pharmaceutically and industrially important 2‐hydroxyacid could be biotechnologically synthesized. Combining crystal structure analysis, active site mutations and kinetic assays,
Michael Zahn   +4 more
wiley   +1 more source

Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental attacks which could only exploit cubes of size less than 40.
Ye, Chen-Dong, Tian, Tian
openaire   +4 more sources

Secure voice based authentication for mobile devices: Vaulted Voice Verification

open access: yes, 2012
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices.
Boult, Terrance E.   +2 more
core   +1 more source

Systemic dysregulation of apolipoproteins in amyotrophic lateral sclerosis serum

open access: yesFEBS Open Bio, EarlyView.
Amyotrophic lateral sclerosis (ALS) is a fatal disease that damages motor neurons. This study found that people with ALS show significant changes in blood fats and the proteins that carry them. Several apolipoproteins were higher, lipid balances were altered, and normal protein–lipid relationships were disrupted.
Finula I. Isik   +6 more
wiley   +1 more source

Predicting and Comparing the Subjective Health Experience of Older Cancer Survivors and Non‐Cancer Survivors: A Modeling Approach

open access: yesAging and Cancer, EarlyView.
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy