Results 101 to 110 of about 404,854 (339)

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

Detection rate for ESR1 mutations is higher in circulating‐tumor‐cell‐derived genomic DNA than in paired plasma cell‐free DNA samples as revealed by ddPCR

open access: yesMolecular Oncology, EarlyView.
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou   +11 more
wiley   +1 more source

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

open access: yesInternet of Things and Cyber-Physical Systems
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma   +2 more
doaj  

Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection [PDF]

open access: yesarXiv, 2010
In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive na\"ive Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due
arxiv  

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk   +2 more
doaj  

Inhibition of acyl‐CoA synthetase long‐chain isozymes decreases multiple myeloma cell proliferation and causes mitochondrial dysfunction

open access: yesMolecular Oncology, EarlyView.
Triacsin C inhibition of the acyl‐CoA synthetase long chain (ACSL) family decreases multiple myeloma cell survival, proliferation, mitochondrial respiration, and membrane potential. Made with Biorender.com. Multiple myeloma (MM) is an incurable cancer of plasma cells with a 5‐year survival rate of 59%.
Connor S. Murphy   +12 more
wiley   +1 more source

A Frequency-Based Approach to Intrusion Detection [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on ...
Mian Zhou, Sheau-Dong Lang
doaj  

TRPM4 contributes to cell death in prostate cancer tumor spheroids, and to extravasation and metastasis in a zebrafish xenograft model system

open access: yesMolecular Oncology, EarlyView.
Transient receptor potential melastatin‐4 (TRPM4) is overexpressed in prostate cancer (PCa). Knockout of TRPM4 resulted in reduced PCa tumor spheroid size and decreased PCa tumor spheroid outgrowth. In addition, lack of TRPM4 increased cell death in PCa tumor spheroids.
Florian Bochen   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy