Results 71 to 80 of about 700,206 (362)

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Intrusion and apical resorption of mandibular incisors in Begg treatment: anchorage bend or curve?

open access: yesAustralasian Orthodontic Journal, 1990
A statistical evaluation of the apical root resorption in mandibular incisors following Begg treatment in one group with anchorage bends and another group with anchorage curves showed no statistical difference.
Lew Kenneth
doaj   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security

open access: yesBig Data Mining and Analytics, 2023
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.
Mouaad Mohy-Eddine   +4 more
doaj   +1 more source

Sensor networks security based on sensitive robots agents. A conceptual model

open access: yes, 2012
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim   +11 more
core   +1 more source

A Deep Learning Approach for Network Intrusion Detection System

open access: yesEAI Endorsed Trans. Security Safety, 2016
A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in their organizations. However, many challenges arise while developing a flexible and efficient NIDS for unforeseen and unpredictable ...
A. Javaid   +3 more
semanticscholar   +1 more source

Intrusion Detection in SCADA Systems

open access: yes, 2014
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI).
Leandros A. Maglaras, Jianmin Jiang
openaire   +14 more sources

Circulating histones as clinical biomarkers in critically ill conditions

open access: yesFEBS Letters, EarlyView.
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez   +17 more
wiley   +1 more source

HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection

open access: yesIEEE Access, 2018
The development of an anomaly-based intrusion detection system (IDS) is a primary research direction in the field of intrusion detection. An IDS learns normal and anomalous behavior by analyzing network traffic and can detect unknown and new attacks ...
Wei Wang   +6 more
semanticscholar   +1 more source

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy