Results 91 to 100 of about 212,014 (305)
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk +2 more
doaj
Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network [PDF]
Hongyu Yang, Fengyan Wang
openalex +1 more source
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués +3 more
wiley +1 more source
A Frequency-Based Approach to Intrusion Detection [PDF]
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on ...
Mian Zhou, Sheau-Dong Lang
doaj
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection [PDF]
Zilong Lin, Yong Shi, Zhi Xue
openalex +1 more source
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck +12 more
wiley +1 more source
Strength through diversity: how cancers thrive when clones cooperate
Intratumor heterogeneity can offer direct benefits to the tumor through cooperation between different clones. In this review, Kuiken et al. discuss existing evidence for clonal cooperativity to identify overarching principles, and highlight how novel technological developments could address remaining open questions.
Marije C. Kuiken +3 more
wiley +1 more source
The current behavior pattern extraction methods in intrusion detection systems cannot fully extract information. To improve the accuracy of such systems, the study first uses sequence feature construction algorithms to explicitly represent sequence ...
Yu Huang, Liangyuan Su
doaj +1 more source
Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj +1 more source

