Results 61 to 70 of about 299,742 (318)

Performance evaluations of AI-based obfuscated and encrypted malicious script detection with feature optimization

open access: yesETRI Journal
In the digital security environment, the obfuscation and encryption of mali-cious scripts are primary attack methods used to evade detection. Thesescripts—easily spread through websites, emails, and file downloads—can beautomatically executed on users ...
Kookjin Kim   +3 more
doaj   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

The Maintenance of Accuracy and Reliability of Electronic Evidence through Biometric and Encryption [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī, 2015
The reliability of electronic evidence means the authenticity of electronic data in court and playing a role in the judgments. In order to have the same demonstrative function as traditional evidence, electronic evidence must meet two main requirements ...
Hasanali Moazenzadegan   +2 more
doaj   +1 more source

Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction

open access: yesIEEE Access, 2022
Electronic Health Records (EHRs) are electronically-stored health information in a digital format. EHRs are typically shared among healthcare stakeholders and face power failure, data misuse, lack of privacy, security, and audit trail. On the other hand,
Abdullah Al Mamun   +2 more
doaj   +1 more source

Purification tags markedly affect self‐aggregation of CPEB3

open access: yesFEBS Letters, EarlyView.
Although recombinant proteins are used to study protein aggregation in vitro, uncleaved tags can interfere with accurate interpretation. Our findings demonstrate that His₆‐GFP and His₁₂ tags significantly affect liquid droplet and amyloid fibril formation in the intrinsically disordered region (IDR) of mouse cytoplasmic polyadenylation element‐binding ...
Harunobu Saito   +6 more
wiley   +1 more source

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain
The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision‐making, innovation, and improving the efficiency of ...
Aditya Kumar Sharma   +3 more
doaj   +1 more source

A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares

open access: yesIEEE Access, 2023
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan   +5 more
doaj   +1 more source

Insights into pegRNA design from editing of the cardiomyopathy‐associated phospholamban R14del mutation

open access: yesFEBS Letters, EarlyView.
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao   +7 more
wiley   +1 more source

Processing Encrypted Data Using Homomorphic Encryption

open access: yes, 2017
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony   +14 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy