Results 91 to 100 of about 199,623 (310)
METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk+2 more
doaj
Loss of primary cilia in endothelial cells promotes EndMT and vascular abnormalities in the ovarian tumor microenvironment through EphA2 activation. Using human samples, in vitro models, and endothelial‐specific Kif3a‐knockout mice, we show that primary cilia loss drives the acquisition of cancer‐associated fibroblast‐like phenotypes, thereby ...
Jin Gu Cho+11 more
wiley +1 more source
A Frequency-Based Approach to Intrusion Detection [PDF]
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on ...
Mian Zhou, Sheau-Dong Lang
doaj
This study identifies nuclear YB‐1 S102 phosphorylation as a marker associated with KRAS and FBXW7 mutations in colorectal cancer. Mutated KRAS correlates specifically with nuclear, not cytoplasmic, S102 YB‐1. These findings provide the first ex vivo evidence of this link in CRC and suggest future studies should assess the prognostic and therapeutic ...
Konstanze Lettau+9 more
wiley +1 more source
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj +1 more source
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp+13 more
wiley +1 more source
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj +1 more source
C–C chemokine receptor type 9 (CCR9) is an immune checkpoint in pancreatic ductal adenocarcinoma (PDAC). Novel anti‐CCR9 antibody SRB2 was evaluated in combination with cytotoxic chemotherapy in PDAC cells, patient‐derived organoids, patient‐derived xenografts, and humanized mouse models.
Hannah G. McDonald+18 more
wiley +1 more source
Intrusion detection algorithm for industrial control system of coal mine enterprise
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj +1 more source
Intrusion Detection using Open Source Tools [PDF]
We have witnessed in the recent years that open source tools have gained popularity among all types of users, from individuals or small businesses to large organizations and enterprises.
Jack TIMOFTE
core