Results 61 to 70 of about 3,766,161 (380)
Circulating histones as clinical biomarkers in critically ill conditions
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez+17 more
wiley +1 more source
A Secure Authentication Protocol for Internet of Vehicles
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the ...
Chien‐Ming Chen+3 more
semanticscholar +1 more source
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani+14 more
wiley +1 more source
Rqa based approach to detect and prevent ddos attacks in voip networks
Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets.
Jeyanthi N.+2 more
doaj +1 more source
Security of internet protocol cameras - A case example [PDF]
The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of ...
Campbell, William
core +2 more sources
Facilitating the creation of IoT applications through conditional observations in CoAP [PDF]
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things.
Demeester, Piet+3 more
core +2 more sources
Breast cancer metastasis is associated with myeloid cell dysregulation and the lung‐specific accumulation of tumor‐supportive Gr1+ cells. Gr1+ cells support metastasis, in part, through a CHI3L1‐mediated mechanism, which can be targeted and inhibited with cargo‐free, polymeric nanoparticles.
Jeffrey A. Ma+9 more
wiley +1 more source
A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same
Riri Fitri Sari+3 more
doaj +1 more source
A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group [PDF]
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements ...
Bishop, Matt
core +2 more sources
The Internet's unexploited path diversity [PDF]
The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to
Arjona-Villicaña, Pedro David+2 more
core +2 more sources