Results 111 to 120 of about 53,015 (296)
An intelligent tutor for intrusion detection on computer systems
Neil C. Rowe, Sandra Jean. Schiavo
openalex +2 more sources
This study highlights the potential of automated enumeration using the ACCEPT software to refine circulating tumor cell (CTC) detection in metastatic colorectal cancer (mCRC). The automated method demonstrates improved accuracy and reduced variability compared to the manual approach.
Michela De Meo +6 more
wiley +1 more source
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié +16 more
wiley +1 more source
Mobile Ad Hoc Network (MANET) is a collection of nodes, which form an infastructureless topology. There is no central access point or centralized management. Intrusion detection in MANETs, however, is challenging for a number of reasons.
Süreyya Mutlu, Güray Yılmaz
doaj
Learning Fingerprints for a Database Intrusion Detection System [PDF]
Sin Yeung Lee +2 more
openalex +1 more source
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
The IFNγ‐CIITA‐MHC II axis modulates melanoma cell susceptibility to NK‐cell‐mediated cytotoxicity
Natural killer (NK) cells play a central role in anti‐melanoma immunity. However, melanoma cells adapt during co‐culture by upregulating CIITA and MHC II in response to interferon gamma (IFNγ), thereby evading NK‐cell lysis. Blocking IFNγ signaling or treatment with dimethyl fumarate/simvastatin counteracts this immune escape and maintains NK‐cell ...
Lena C. M. Krause +6 more
wiley +1 more source
Mimicry attacks on host-based intrusion detection systems [PDF]
David Wagner, Paolo Soto
openalex +1 more source

