Results 81 to 90 of about 716,322 (331)
A consensus based network intrusion detection system
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip +2 more
core +1 more source
ABSTRACT Background Osteosarcoma (OS) and Ewing sarcoma (EWS) are the most common primary bone cancers in children, but acute thrombosis is poorly characterized in this population. Our study evaluated the rates of venous thromboembolism (VTE) and associated risk factors in pediatric patients with bone sarcomas treated over a 10‐year period encompassing
Sarah Kappa +8 more
wiley +1 more source
Management of traumatically intruded permanent incisors
Intrusive luxation of permanent teeth has great psychologic impact on both parents and children and presents clinical challenge for the dentist, all the more due to severe complications it is difficult to manage this group of dental injuries.
Shivayogi M, Anand L, Dayanand D
doaj
Intrusion Detection Using Mouse Dynamics
Compared to other behavioural biometrics, mouse dynamics is a less explored area. General purpose data sets containing unrestricted mouse usage data are usually not available.
Antal, Margit, Egyed-Zsigmond, Elod
core +2 more sources
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
Intrusion of Dacron Sutures and A Recurrent Vitreous Hemorrhage: Rare Complication of Scleral Buckle
We present a case of intrusion of a Dacron suture 8 years after scleral buckling surgery. Though rare, scleral buckle has to be removed if it is associated with complications like intrusion or extrusion, infection, or anterior segment ischemia.
Jignesh Manshibhai Gala, Raja Narayanan
doaj +1 more source
Intrusion Detection Systems Using Adaptive Regression Splines [PDF]
Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems.
Abraham, Ajith +3 more
core +4 more sources
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source
Intrusive sheets and sheeted intrusions at Elba Island, Italy [PDF]
The processes leading to successful versus failed coalescence of similar magma batches upon their emplacement are investigated at Elba Island (Tuscany), where several magma bodies were generated at a single magmatic center over a time span of ∼1 Ma during the Late Miocene. Three nested Christmas-tree laccoliths made up of separated, shallow-level
ROCCHI, SERGIO +3 more
openaire +3 more sources
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source

