Results 91 to 100 of about 199,623 (310)

METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk   +2 more
doaj  

Loss of primary cilia promotes EphA2‐mediated endothelial‐to‐mesenchymal transition in the ovarian tumor microenvironment

open access: yesMolecular Oncology, EarlyView.
Loss of primary cilia in endothelial cells promotes EndMT and vascular abnormalities in the ovarian tumor microenvironment through EphA2 activation. Using human samples, in vitro models, and endothelial‐specific Kif3a‐knockout mice, we show that primary cilia loss drives the acquisition of cancer‐associated fibroblast‐like phenotypes, thereby ...
Jin Gu Cho   +11 more
wiley   +1 more source

A Frequency-Based Approach to Intrusion Detection [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on ...
Mian Zhou, Sheau-Dong Lang
doaj  

The subcellular distribution of phosphorylated Y‐box‐binding protein‐1 at S102 in colorectal cancer patients, stratified by KRAS mutational status and clinicopathological features

open access: yesMolecular Oncology, EarlyView.
This study identifies nuclear YB‐1 S102 phosphorylation as a marker associated with KRAS and FBXW7 mutations in colorectal cancer. Mutated KRAS correlates specifically with nuclear, not cytoplasmic, S102 YB‐1. These findings provide the first ex vivo evidence of this link in CRC and suggest future studies should assess the prognostic and therapeutic ...
Konstanze Lettau   +9 more
wiley   +1 more source

Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning

open access: yesApplied System Innovation
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj   +1 more source

A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner

open access: yesMolecular Oncology, EarlyView.
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp   +13 more
wiley   +1 more source

Design of Intrusion Detection and Response Mechanism for Power Grid SCADA Based on Improved LSTM and FNN

open access: yesIEEE Access
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj   +1 more source

Therapeutic applications of a novel humanized monoclonal antibody targeting chemokine receptor CCR9 in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
C–C chemokine receptor type 9 (CCR9) is an immune checkpoint in pancreatic ductal adenocarcinoma (PDAC). Novel anti‐CCR9 antibody SRB2 was evaluated in combination with cytotoxic chemotherapy in PDAC cells, patient‐derived organoids, patient‐derived xenografts, and humanized mouse models.
Hannah G. McDonald   +18 more
wiley   +1 more source

Intrusion detection algorithm for industrial control system of coal mine enterprise

open access: yesGong-kuang zidonghua, 2018
In view of problems that existing intrusion detection algorithms for industrial control system(ICS) of coal mine enterprise failed to consider impact of defense factors and complexity of implementation, from two aspects of attack process and defense ...
WU Kaixing, WANG Wending, LI Lihong
doaj   +1 more source

Intrusion Detection using Open Source Tools [PDF]

open access: yes
We have witnessed in the recent years that open source tools have gained popularity among all types of users, from individuals or small businesses to large organizations and enterprises.
Jack TIMOFTE
core  

Home - About - Disclaimer - Privacy