Results 101 to 110 of about 404,854 (339)
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad+13 more
wiley +1 more source
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou+11 more
wiley +1 more source
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma+2 more
doaj
Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection [PDF]
In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive na\"ive Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due
arxiv
Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu+7 more
wiley +1 more source
METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk+2 more
doaj
Triacsin C inhibition of the acyl‐CoA synthetase long chain (ACSL) family decreases multiple myeloma cell survival, proliferation, mitochondrial respiration, and membrane potential. Made with Biorender.com. Multiple myeloma (MM) is an incurable cancer of plasma cells with a 5‐year survival rate of 59%.
Connor S. Murphy+12 more
wiley +1 more source
A Frequency-Based Approach to Intrusion Detection [PDF]
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on ...
Mian Zhou, Sheau-Dong Lang
doaj
Transient receptor potential melastatin‐4 (TRPM4) is overexpressed in prostate cancer (PCa). Knockout of TRPM4 resulted in reduced PCa tumor spheroid size and decreased PCa tumor spheroid outgrowth. In addition, lack of TRPM4 increased cell death in PCa tumor spheroids.
Florian Bochen+6 more
wiley +1 more source