Results 91 to 100 of about 404,854 (339)

Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance

open access: yesMolecular Oncology, EarlyView.
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang   +8 more
wiley   +1 more source

Novel hybrid intrusion detection system for clustered wireless sensor network [PDF]

open access: yes, 2011
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect ...
arxiv   +1 more source

Integrative analysis of circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients: a comprehensive approach

open access: yesMolecular Oncology, EarlyView.
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou   +13 more
wiley   +1 more source

Data Pre-Processing and Classification for Traffic Anomaly Intrusion Detection Using NSLKDD Dataset

open access: yesCybernetics and Information Technologies, 2018
Network security is essential in the Internet world. Intrusion Detection is one of the network security components. Anomaly Intrusion Detection is a type of intrusion detection that captures the intrinsic characteristics of normal data and uses it in the
Gnanaprasanambikai L.   +1 more
doaj   +1 more source

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks [PDF]

open access: yesarXiv, 2008
In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on
arxiv  

The PTTG1/VASP axis promotes oral squamous cell carcinoma metastasis by modulating focal adhesion and actin filaments

open access: yesMolecular Oncology, EarlyView.
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park   +6 more
wiley   +1 more source

Research on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm

open access: yesChemical Engineering Transactions, 2016
In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks.
H.F. Hu, W.N. He
doaj   +1 more source

NanoCMSer: a consensus molecular subtype stratification tool for fresh‐frozen and paraffin‐embedded colorectal cancer samples

open access: yesMolecular Oncology, EarlyView.
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang   +10 more
wiley   +1 more source

A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning

open access: yesHeliyon, 2022
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie   +4 more
doaj  

Intrusion Detection using Sequential Hybrid Model [PDF]

open access: yesarXiv, 2019
A large amount of work has been done on the KDD 99 dataset, most of which includes the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes use of two different anomaly detection models followed by misuse detection applied ...
arxiv  

Home - About - Disclaimer - Privacy